Ning Li, D. Zhang, Xiaorong Gu, Li Huang, W. Liu, T. Xu
{"title":"Improved mean shift algorithm for moving object tracking","authors":"Ning Li, D. Zhang, Xiaorong Gu, Li Huang, W. Liu, T. Xu","doi":"10.1109/CCECE.2015.7129489","DOIUrl":"https://doi.org/10.1109/CCECE.2015.7129489","url":null,"abstract":"Mean shift is a nonparametric estimator of density gradient. Traditional mean shift algorithm is rather sensitive to the influence of background. Therefore, an improved mean shift object tracking algorithm is proposed. Firstly, a novel weights given method is given, which improves the kernel function. The method is that the pixels which near the centre of object are given biggest weights, and the pixels which at the edge of the object are given by exponent distribution as a result of occlusion. In order to hand the occlusion, the occlusion detecting method based on sub-block detecting is also established. The novel sub-block detecting algorithm is that the tracking window is divided into two parts, including right and left, and the similarity measure is calculated respectively. The simulation results show that the improved mean shift algorithm can hand the occlusion effectively and track the moving object very well, and it can track moving object more powerful than the basic mean shift tracked.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-behavior based software fault detection for device","authors":"Lanlan Rui, Shaoyong Guo, Luoming Meng, Ting Wu","doi":"10.1109/ICCET.2010.5485543","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485543","url":null,"abstract":"The paper focuses on the Pre-Detection for device fault to ensure the reliability of the devices. A User-Behavior based software fault detection method was proposed, which imports User-Behavior analysis to select the high priority service set for Pre-Detection of the device software fault. The method is user oriented and could improve the efficiency of detection. The architecture and flow for the User-Behavior based software fault detection were introduced. In addition, the User-Behavior Analysis model and the User-Behavior Set-Selection model to reflect the dependence degree of the user to each service were given. At last, the method was validated by simulation and proved to be valid by comparing with other Pre-Detection methods.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extension and application of protocol composition logic","authors":"Ziyi You, Juntao Li, Xiaoyao Xie","doi":"10.1109/ICCET.2010.5485720","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485720","url":null,"abstract":"Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. Because the PCL composition theorems support compositional reasoning about security protocols, including parallel composition of different protocols, and sequential composition of protocol steps, it is particularly useful in carrying out larger-scale security protocol studies. In this paper, PCL is extened by strand space model(SSM) and temporal logic (TL) to better describe and verify complex protocols. Based on improved PCL, the TLS protocol is verified as an example and proved to satisfy authentication property.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"52 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionThe research of teacher's instruction quality appraisal system","authors":"Xin Yu","doi":"10.1109/ICCET.2010.5485795","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485795","url":null,"abstract":"The classroom instruction quality appraisal system establishment should follow the explorative, the scientific nature, the hierarchical, the feasibility and the dynamic principle, its content should include generally: The teaching manner, the content, the method and the effect, and from multiple perspectives and so on student, colleague teacher, leader and proctor carry on the appraisal, guarantees the appraisal the validity and the letter. This article attempts through to establish the effective appraisal system to urge the teacher to improve the quality of teaching.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recontruction of temperature measurement for flame using holographic interferometry","authors":"Jinrong Zhu, Suyi Huang, Huai-Chun Zhou, Lv Wei","doi":"10.1109/ICCET.2010.5485831","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485831","url":null,"abstract":"Temperature field of axisymmetric ethylene diffusion flame is measured using laser holographic interferometry. The projection reversal of a given condition is completed through direct discrete for deformation formula of Abel inverse transformation. Abel inverse transformation is connected with Abel transformation. According to the characteristics of axisymmetric field, Appropriate half data is selected to obtain symmetrization for phase distribution of original data. Self-closing of this algorithm is confirmatory. The above calculation and analysis indicate that the algorithm has well self-closure; The algorithm is unable to eliminate nature that Abel inverse transformation is sensitive to noise in near axis region. The error level causing by self-closure of algorithm is significantly below the self-noise of original data for projected phase.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionThe existence of infinitely many positive solutions for three-point boundary value problem with p-Laplacian","authors":"Hongling Fan, Fuyi Xu","doi":"10.1109/ICCET.2010.5485233","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485233","url":null,"abstract":"In this paper, we consider three-point boundary value problem (φ<sub>p</sub>(u'))' + a(t)f(u) = 0, 0 <; t <; 1 where φ<sub>p</sub>(u) = |u|<sup>p-2</sup>u, p > 1, subject to nonlinear boundary conditions. We show that there exist positive solution and countably many positive solutions by fixed point theorems in a cone.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection based on sensitivity using evolutionary neural network","authors":"Bi-ying Zhang","doi":"10.1109/ICCET.2010.5485268","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485268","url":null,"abstract":"A novel evolutionary neural network (ENN) was presented for feature selection. In order to improve the convergent speed of the evolutionary algorithm and the accuracy of classification, a heuristic mutation operator and an adaptive mutation rate was proposed. The importance of each feature was measured with the output sensitivity, and then it was taken as the heuristic to guide the searching procedure. The evolutionary programming was employed to optimize the feature subset, and the back-propagation (BP) algorithm was used to adapt the connection weights of ENN. To evaluate the performance of the proposed approach, the experiments were conducted using three well-known classification problems. The experimental results show that the proposed method has better convergent speed and achieves fewer input features than the traditional method. Furthermore, the proposed method is superior to the traditional method in terms of training accuracy and test accuracy.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionMulti-criteria analysis of C4I architecture frameworks","authors":"A. Alghamdi, I. Ahmad","doi":"10.1109/ICCET.2010.5486188","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5486188","url":null,"abstract":"An aggrandized praxis of C4I systems in aegis and civil aeon had made it more imperative and enticing. Ergo, we can corroborate that researchers, analysts, doodlers and developers had taken much curiosity in C4I systems. This paper epitomizes a multi-criteria analysis of C4I architecture frameworks such as ADOAF, DNDAF, AGATE, and FEA. These frameworks have been used in doodle and chrysalis process of aegis erudition systems. In this work, we used multi criteria software for metaphorical assay of incommensurable aegis megacorp frameworks. Further, denouements obtained by analysis are discussed. The accomplishment done in this paper may be utilized by the researchers in two incommensurable expedient ways, either by using the denouements directly obtained in this paper or by extracting the denouements by similar approach but on incommensurable architecture frameworks (AFs) in the field of C4I Systems.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionStudy on typical architectural glasses impacted by blast","authors":"L. Lei, An Er-feng, Yang Jun","doi":"10.1109/ICCET.2010.5486172","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5486172","url":null,"abstract":"A lot of glass windows which have been applied on modern architecture can give us comfort space, but also more dangers when exploding. The windows made of glasses have been the killing weapons that used by bombing terrorism. In order to control the bad effects produced by glass windows, three typical architectural glasses impacted by blast were studied by the experiments of shock wave pressure test. The experiments results show that all glasses impacted by blast become unsafe. Tempered glass and laminated glass become unsafe and the fatalness of float glass is greatly increased. Finally, the phenomena of float glasses impacted by blast was simulated with the two dimensional NMM program. The simulation results are in good agreements with the experimental ones. Further study on the glasses impacted by blast can make them more safely to us.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terrain rendering based on virtual attention","authors":"Zheng Peng, Yu Lin, Gang Yu","doi":"10.1109/ICCET.2010.5485589","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485589","url":null,"abstract":"In this paper we present a novel method for terrain rendering which is based on visual attention. Our method first statically subdivides the terrain into some rectangular patches that is dynamically subdivided into some rectangular tiles at runtime. Finally, the tiles are used to construct mesh based on visual attention. Because we calculate the levels of detail of each tile's edges and the adjacent tiles share a same edge, the resulted mesh does not include any cracks naturally. Dynamically subdivision can balance the number of calling API and the complexity of geometry to improve the efficiency of rendering. Visual attention not only makes the render quality is better, but also stabilize the frame rate and eliminate the visual bound. Our approach achieves terrain rendering at a high stable frame rate.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}