{"title":"Design of the linear gradient of DC high voltage power supply based on X-ray machine","authors":"K. Zhao, Ping Chen","doi":"10.1109/ICIS.2014.6912135","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912135","url":null,"abstract":"The emergence of technology which contains variable energy data acquisition and intelligent imaging has greatly accelerated the development of image acquisition based on X-ray. Although the emergence of this kind of intelligent technology improves the efficiency of working, the most are accomplished based on the software, and high voltage power supply itself is lack of controlling for the process of high pressure gradient, so that it can't focus on the process of data collection well. Demand on above, we put forward design of the linear gradient of dc high voltage power supply based on X-ray machine, the system of high voltage sccurce starts from hardware and software and solves the previous problem very well at the same time. The high-voltage source uses technology of PID control (Proportional-Integral-Differential Controller), it has the function of the automatic linear gradient of and the slope of process of high pressure gradient is adjustable, and it can get the feedback all the time, the precision and ripple of output are maintained within 0.1%. The development based on the function have been put forward and is in the research, its actual value is relatively significant.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conceptual architecture with trust consensus to enhance group recommendations","authors":"Edson B. Santos Junior, M. Manzato, R. Goularte","doi":"10.1109/ICIS.2014.6912121","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912121","url":null,"abstract":"Recommender Systems have been studied and developed as an indispensable technique of the Information Filtering field. A drawback of traditional user-item systems is that most recommenders ignore connections consistent with the real world recommendations. Furthermore, trust-based approaches ignore the group modeling and do not respect the users' individualities in a group recommendation set. In this paper, we propose a conceptual architecture which uses the social trust consensus from users to improve the accuracy of the trust-based recommender systems. It is based on an existent model and integrates user's trust relations and item's factors into a generic latent factor model. One advantage of our model is the possibility to bias the users' similarity computation according to a trust consensus that assists in the formation of groups, such as the group of individuals who share the same content. The proposal represents the first steps towards the development of a group recommender system model. We provide an evaluation of our method with the Epinions dataset and compare our approach against other state-of-the-art techniques.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123456152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A virtual machine based task scheduling approach to improving data locality for virtualized Hadoop","authors":"Ruiqi Sun, Jie Yang, Zhan Gao, Zhiqiang He","doi":"10.1109/ICIS.2014.6912150","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912150","url":null,"abstract":"MapReduce emerges as an important distributed programming paradigm for large-scale data analysis applications. As an open-source implementation of MapReduce, Hadoop presents an attractive usage system for many enterprises. There are some drawbacks in a traditional Hadoop cluster deployed with a large scale of physical machines, such as burdensome cluster management and fluctuating resource utilization. Virtualized Hadoop cluster not only simplifies cluster management, but also facilitates cost-effective workload consolidation for resource utilization. In Hadoop system, the data locality is a critical factor impacting on performance of MapReduce applications. However, existing task scheduling approaches to improving data locality of virtualized Hadoop are not effective because of two levels distribution of data: virtual machines and physical servers. In this paper, we deploy virtualized Hadoop cluster in which computing node and storage node are placed in respective virtual machines to improve flexibility. We propose a novel task scheduling approach which aims to improve data locality for virtualized Hadoop cluster through migrating the virtual machine acted as computing node to the physical server running virtual machine acted as storage node that holds a data replica needed by that computing node. We evaluated our approach's efficiency on a virtualized Hadoop cluster with the aforementioned deployment for 11 computing nodes and 12 storage nodes. Our experiment results show that our approach improves performance of 86% typical MapReduce applications in our benchmark suite at varying degrees.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some issues regarding operating system security","authors":"S. Qing","doi":"10.1109/ICIS.2014.6912096","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912096","url":null,"abstract":"Summary form only given. In this presentation, several issues regarding operating system security will be investigated. The general problems of OS security are to be addressed. We also discuss why we should consider the security aspects of the OS, and when a secure OS is needed. We delve into the topic of secure OS design as well focusing on covert channel analysis. The specific operating systems under consideration include Windows and Android.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrared face recognition based on local binary patterns and Kruskal-Wallis test","authors":"Zhengzi Wang, Zhihua Xie","doi":"10.1109/ICIS.2014.6912131","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912131","url":null,"abstract":"Infrared imaging can acquire the intrinsic temperature information of the skin, which is robust to the impacts of illumination conditions and disguises. This paper proposes an improved infrared face recognition method based on local binary pattern (LBP). To extract the local robust features in infrared face images, LBP is chosen to get the composition of micro-patterns of sub-blocks. Based on statistical test theory, Kruskal-Wallis (KW) feature selection method is proposed to get the LBP patterns which are suitable for infrared face recognition. The experimental results show combination of LBP and KW features selection improves the performance of infrared face recognition, the proposed method outperforms the traditional methods based on LBP histogram, discrete cosine transform(DCT) or principal component analysis(PCA).","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Empirical Mode Decomposition based on up-sampling","authors":"Jialing Mo, Weiping Hu, Shasha Le","doi":"10.1109/ICIS.2014.6912171","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912171","url":null,"abstract":"The paper proposes an improved Empirical Mode Decomposition method based on up-sampling, due to the energy leakage in traditional Empirical Mode Decomposition for insufficient sampling rate(digital domain frequency greater than 0.2). The method uses the signal interpolation to improve sampling rate before EMD, and then recovers the original scale by corresponding down-sampling and low pass filtering. The numerical results show that it can partly recover the accurate position of extreme points and effectively reduce the energy leakage. Three typical interpolations are also employed and the result shows that the effect of using cubic spline interpolation with 4 times is the best relatively.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A research based on adaptive genetic algorithm optimal embattling method","authors":"Ye-yang Pan, Jin-jie Yao","doi":"10.1109/ICIS.2014.6912105","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912105","url":null,"abstract":"In the high-speed flight target positioning, the base stations' locations influence the target localization accuracy directly. As the traditional base station layout positioning precision is not high, this paper proposes an optimal layout base station scheme which is bassd on adaptive genetic algorithm. The paper introduces the GA from the selection crossover and mutation operations, with the geometrical factor -GDOP as fitness function, end rsalizes the ground stations optimal layout. The simutulion results show that the scheme can optimize the base stations' locations, and improve the positioning precision of high speed targets.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic generation of package diagram to understand Java packages","authors":"Li Jiang, Xiaobing Sun, Yun Li, Xiangyue Liu","doi":"10.1109/ICIS.2014.6912157","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912157","url":null,"abstract":"Program comprehension is a prerequisite in most software maintenance and evolution tasks. Given an unfamiliar system, it is difficult for practitioners to determine which software artifacts are relevant to the current task. Generally, there are a variety of packages in a Java software system. These packages often have different intents and different relationships between each other. Different information of packages and the relationships between different stereotypes packages form a signature of the system. This paper proposes a novel approach to automatically generate the description of the packages and its diagram to show relationships between the packages. The generated description and diagram can allow developers to more easily understand the main intent and structure of the system.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective precision analysis method for word length optimization","authors":"Ruiyi Sun, Yan Zhang","doi":"10.1109/ICIS.2014.6912114","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912114","url":null,"abstract":"In the existing methods, the process of sub-systems' output word lengths determination is iterative when the system is partitioned. To save time, the proposed static precision analysis method in this paper does not need to be iterative during the determination of the output precision of sub-systems. In this paper, the fractional word length of each signal is divided into two parts: the uniform fractional word length (UFWL) and the rectificatory fractional word length (RFWL). Hence, the minimized system area of one sub-system can be expressed as a function, which is related to the output precision of the sub-system. The implement time of this method is reduced significantly with the growth of the number of the sub-systems. This method is demonstrated with some cases. Compared with the existing word length optimization tool LengthFinder for 15 output precisions, the saving time is from 54.55% to 97.61%.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web navigation pattern with automatic reconfiguration of servers","authors":"C. Raju","doi":"10.1109/ICIS.2014.6912127","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912127","url":null,"abstract":"Understanding the navigational behaviour of website visitors is a significant factor of success in the emerging business model of electronic commerce and even mobile Commerce. The Web navigation patterns, termed throughout-surfing patterns (TSPs) as defined in this paper, are a superset of Web traversal patterns that effectively display the trends toward the next visited Web pages in a browsing session. TSPs are more expressive for understanding the purposes of website visitors. In this report, we first introduce the concept of throughout-surfing patterns and then present an efficient method for mining the patterns. We propose a compact graph structure, termed a path traversal graph, to record information about the navigation paths of website visitors. The graph contains the frequent surfing paths that are required for mining TSPs. In addition, we devised a graph traverse algorithm based on the proposed graph structure to discover the TSPs. This website will be hosted in a server, where we will be introducing the concept of automatic reconfiguration of storage systems. This system will be providing a master slave server where even if the master server crashes the replica of the data will be stored in the slave server dynamically and the slave server will be automatically configured as the master server. In this case the end user doesn't have to face issues with server crash, data loss, or delay of data.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130857191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}