2010 2nd International Conference on Computer Engineering and Technology最新文献

筛选
英文 中文
Improved mean shift algorithm for moving object tracking 运动目标跟踪的改进均值移位算法
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2015-05-03 DOI: 10.1109/CCECE.2015.7129489
Ning Li, D. Zhang, Xiaorong Gu, Li Huang, W. Liu, T. Xu
{"title":"Improved mean shift algorithm for moving object tracking","authors":"Ning Li, D. Zhang, Xiaorong Gu, Li Huang, W. Liu, T. Xu","doi":"10.1109/CCECE.2015.7129489","DOIUrl":"https://doi.org/10.1109/CCECE.2015.7129489","url":null,"abstract":"Mean shift is a nonparametric estimator of density gradient. Traditional mean shift algorithm is rather sensitive to the influence of background. Therefore, an improved mean shift object tracking algorithm is proposed. Firstly, a novel weights given method is given, which improves the kernel function. The method is that the pixels which near the centre of object are given biggest weights, and the pixels which at the edge of the object are given by exponent distribution as a result of occlusion. In order to hand the occlusion, the occlusion detecting method based on sub-block detecting is also established. The novel sub-block detecting algorithm is that the tracking window is divided into two parts, including right and left, and the similarity measure is calculated respectively. The simulation results show that the improved mean shift algorithm can hand the occlusion effectively and track the moving object very well, and it can track moving object more powerful than the basic mean shift tracked.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
User-behavior based software fault detection for device 基于用户行为的设备软件故障检测
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485543
Lanlan Rui, Shaoyong Guo, Luoming Meng, Ting Wu
{"title":"User-behavior based software fault detection for device","authors":"Lanlan Rui, Shaoyong Guo, Luoming Meng, Ting Wu","doi":"10.1109/ICCET.2010.5485543","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485543","url":null,"abstract":"The paper focuses on the Pre-Detection for device fault to ensure the reliability of the devices. A User-Behavior based software fault detection method was proposed, which imports User-Behavior analysis to select the high priority service set for Pre-Detection of the device software fault. The method is user oriented and could improve the efficiency of detection. The architecture and flow for the User-Behavior based software fault detection were introduced. In addition, the User-Behavior Analysis model and the User-Behavior Set-Selection model to reflect the dependence degree of the user to each service were given. At last, the method was validated by simulation and proved to be valid by comparing with other Pre-Detection methods.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension and application of protocol composition logic 协议组合逻辑的扩展与应用
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485720
Ziyi You, Juntao Li, Xiaoyao Xie
{"title":"Extension and application of protocol composition logic","authors":"Ziyi You, Juntao Li, Xiaoyao Xie","doi":"10.1109/ICCET.2010.5485720","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485720","url":null,"abstract":"Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. Because the PCL composition theorems support compositional reasoning about security protocols, including parallel composition of different protocols, and sequential composition of protocol steps, it is particularly useful in carrying out larger-scale security protocol studies. In this paper, PCL is extened by strand space model(SSM) and temporal logic (TL) to better describe and verify complex protocols. Based on improved PCL, the TLS protocol is verified as an example and proved to satisfy authentication property.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"52 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of RetractionThe research of teacher's instruction quality appraisal system 撤回通知教师教学质量评价体系研究
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485795
Xin Yu
{"title":"Notice of RetractionThe research of teacher's instruction quality appraisal system","authors":"Xin Yu","doi":"10.1109/ICCET.2010.5485795","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485795","url":null,"abstract":"The classroom instruction quality appraisal system establishment should follow the explorative, the scientific nature, the hierarchical, the feasibility and the dynamic principle, its content should include generally: The teaching manner, the content, the method and the effect, and from multiple perspectives and so on student, colleague teacher, leader and proctor carry on the appraisal, guarantees the appraisal the validity and the letter. This article attempts through to establish the effective appraisal system to urge the teacher to improve the quality of teaching.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recontruction of temperature measurement for flame using holographic interferometry 用全息干涉法重建火焰温度测量
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485831
Jinrong Zhu, Suyi Huang, Huai-Chun Zhou, Lv Wei
{"title":"Recontruction of temperature measurement for flame using holographic interferometry","authors":"Jinrong Zhu, Suyi Huang, Huai-Chun Zhou, Lv Wei","doi":"10.1109/ICCET.2010.5485831","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485831","url":null,"abstract":"Temperature field of axisymmetric ethylene diffusion flame is measured using laser holographic interferometry. The projection reversal of a given condition is completed through direct discrete for deformation formula of Abel inverse transformation. Abel inverse transformation is connected with Abel transformation. According to the characteristics of axisymmetric field, Appropriate half data is selected to obtain symmetrization for phase distribution of original data. Self-closing of this algorithm is confirmatory. The above calculation and analysis indicate that the algorithm has well self-closure; The algorithm is unable to eliminate nature that Abel inverse transformation is sensitive to noise in near axis region. The error level causing by self-closure of algorithm is significantly below the self-noise of original data for projected phase.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Notice of RetractionThe existence of infinitely many positive solutions for three-point boundary value problem with p-Laplacian 关于带p-拉普拉斯算子的三点边值问题的无穷多个正解的存在性
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485233
Hongling Fan, Fuyi Xu
{"title":"Notice of RetractionThe existence of infinitely many positive solutions for three-point boundary value problem with p-Laplacian","authors":"Hongling Fan, Fuyi Xu","doi":"10.1109/ICCET.2010.5485233","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485233","url":null,"abstract":"In this paper, we consider three-point boundary value problem (φ<sub>p</sub>(u'))' + a(t)f(u) = 0, 0 <; t <; 1 where φ<sub>p</sub>(u) = |u|<sup>p-2</sup>u, p > 1, subject to nonlinear boundary conditions. We show that there exist positive solution and countably many positive solutions by fixed point theorems in a cone.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection based on sensitivity using evolutionary neural network 基于灵敏度的进化神经网络特征选择
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485268
Bi-ying Zhang
{"title":"Feature selection based on sensitivity using evolutionary neural network","authors":"Bi-ying Zhang","doi":"10.1109/ICCET.2010.5485268","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485268","url":null,"abstract":"A novel evolutionary neural network (ENN) was presented for feature selection. In order to improve the convergent speed of the evolutionary algorithm and the accuracy of classification, a heuristic mutation operator and an adaptive mutation rate was proposed. The importance of each feature was measured with the output sensitivity, and then it was taken as the heuristic to guide the searching procedure. The evolutionary programming was employed to optimize the feature subset, and the back-propagation (BP) algorithm was used to adapt the connection weights of ENN. To evaluate the performance of the proposed approach, the experiments were conducted using three well-known classification problems. The experimental results show that the proposed method has better convergent speed and achieves fewer input features than the traditional method. Furthermore, the proposed method is superior to the traditional method in terms of training accuracy and test accuracy.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Notice of RetractionMulti-criteria analysis of C4I architecture frameworks 撤销通知C4I架构框架多准则分析
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5486188
A. Alghamdi, I. Ahmad
{"title":"Notice of RetractionMulti-criteria analysis of C4I architecture frameworks","authors":"A. Alghamdi, I. Ahmad","doi":"10.1109/ICCET.2010.5486188","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5486188","url":null,"abstract":"An aggrandized praxis of C4I systems in aegis and civil aeon had made it more imperative and enticing. Ergo, we can corroborate that researchers, analysts, doodlers and developers had taken much curiosity in C4I systems. This paper epitomizes a multi-criteria analysis of C4I architecture frameworks such as ADOAF, DNDAF, AGATE, and FEA. These frameworks have been used in doodle and chrysalis process of aegis erudition systems. In this work, we used multi criteria software for metaphorical assay of incommensurable aegis megacorp frameworks. Further, denouements obtained by analysis are discussed. The accomplishment done in this paper may be utilized by the researchers in two incommensurable expedient ways, either by using the denouements directly obtained in this paper or by extracting the denouements by similar approach but on incommensurable architecture frameworks (AFs) in the field of C4I Systems.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121579475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of RetractionStudy on typical architectural glasses impacted by blast 典型建筑玻璃受爆炸冲击收缩研究的通知
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5486172
L. Lei, An Er-feng, Yang Jun
{"title":"Notice of RetractionStudy on typical architectural glasses impacted by blast","authors":"L. Lei, An Er-feng, Yang Jun","doi":"10.1109/ICCET.2010.5486172","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5486172","url":null,"abstract":"A lot of glass windows which have been applied on modern architecture can give us comfort space, but also more dangers when exploding. The windows made of glasses have been the killing weapons that used by bombing terrorism. In order to control the bad effects produced by glass windows, three typical architectural glasses impacted by blast were studied by the experiments of shock wave pressure test. The experiments results show that all glasses impacted by blast become unsafe. Tempered glass and laminated glass become unsafe and the fatalness of float glass is greatly increased. Finally, the phenomena of float glasses impacted by blast was simulated with the two dimensional NMM program. The simulation results are in good agreements with the experimental ones. Further study on the glasses impacted by blast can make them more safely to us.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terrain rendering based on virtual attention 基于虚拟注意力的地形渲染
2010 2nd International Conference on Computer Engineering and Technology Pub Date : 2010-06-17 DOI: 10.1109/ICCET.2010.5485589
Zheng Peng, Yu Lin, Gang Yu
{"title":"Terrain rendering based on virtual attention","authors":"Zheng Peng, Yu Lin, Gang Yu","doi":"10.1109/ICCET.2010.5485589","DOIUrl":"https://doi.org/10.1109/ICCET.2010.5485589","url":null,"abstract":"In this paper we present a novel method for terrain rendering which is based on visual attention. Our method first statically subdivides the terrain into some rectangular patches that is dynamically subdivided into some rectangular tiles at runtime. Finally, the tiles are used to construct mesh based on visual attention. Because we calculate the levels of detail of each tile's edges and the adjacent tiles share a same edge, the resulted mesh does not include any cracks naturally. Dynamically subdivision can balance the number of calling API and the complexity of geometry to improve the efficiency of rendering. Visual attention not only makes the render quality is better, but also stabilize the frame rate and eliminate the visual bound. Our approach achieves terrain rendering at a high stable frame rate.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信