{"title":"Adaptive Correction of Errors from Segmented Digital Ink Texts in Chinese Based on Context","authors":"Xiwen Zhang, Wei-hua An, Yong-Gang Fu","doi":"10.1109/ITCS.2010.14","DOIUrl":"https://doi.org/10.1109/ITCS.2010.14","url":null,"abstract":"Digital ink texts in Chinese can neither be converted into users’ desired layouts nor be recognized until their characters, lines, and paragraphs are correctly extracted. There are many errors in automatically segmented digital ink texts in Chinese because they are free forms and mixed with other languages, as well as their Chinese characters have small gaps and complex structures. Paragraphs, lines, and characters (recognizable language symbols) in digital ink may be wrongly extracted. An adaptive approach based on context is proposed to correct wrongly extracted these objects. Each extracted object is first adaptively visualized by color and shape labels according to relations between it and its neighbors. Users use simple gestures naturally and easily to merge and split wrongly extracted objects. Contexts are constructed from users’ gestures and objects invoked by them, where users’ intensions are identified. We have conducted experiments using real-life segmented digital ink texts in Chinese and compared the proposed approach with others. Experimental results demonstrate that the proposed approach is feasible, flexible, effective, and robust.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125954880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Texture Analysis Using GMRF Model for Image Segmentation on Spectral Clustering","authors":"Jin Huazhong, Ke Min-yi, Yan Xiwei, Wan Fang","doi":"10.1109/ITCS.2010.22","DOIUrl":"https://doi.org/10.1109/ITCS.2010.22","url":null,"abstract":"Spectral clustering algorithms are newly developing technique in recent years. In this paper, we derive a new pairwise affinity function for spectral clustering based on a measure of texture features represented by Gaussian Markov Random Field (GMRF) model. This model is used to capture the statistical properties of the neighborhood at a pixel, and then pairwise affinities represented by it can cluster the pixels into coherent groups. Having obtained a local similarity measured by regions of coherent texture and brightness, we use the normalized cuts to find partitions of the image. Experimental results demonstrate that the proposed method is effective and robust for image segmentation.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127239607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Reliability Evaluation Based on Cloud Model","authors":"Qian Fu, Zhi-Hua Cai, Yi-qi Wu","doi":"10.1109/ITCS.2010.35","DOIUrl":"https://doi.org/10.1109/ITCS.2010.35","url":null,"abstract":"Cloud model can be used for reliability evaluation when the working condition is changeable and described by the qualitative linguistic values. It is neglected that the most typical sample in cloud model also contains some uncertainty when evaluate the reliability of products using cloud model. For this reason, a cloud model is used to describe the uncertainty of the most typical sample. The experimental results show that the reliability evaluation result is closer to the reality when using the cloud model that considering the uncertainty of the most typical sample.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation for Cooling System of Thermoforming","authors":"Yun-de Shen, Zhen-Zhe Li, Ming Ren, S. Seol","doi":"10.1109/ITCS.2010.60","DOIUrl":"https://doi.org/10.1109/ITCS.2010.60","url":null,"abstract":"Thermoforming is one of the most versatile and economical processes available for polymer products. The cooling process is one of the key processes of thermoforming which effects to quality of final products. In this study, two kinds of 1-d analysis models were developed under the condition of checking the possibility of changing a 2-d to a 1-d problem in a previous study. At first, a model for stability analysis of the cooling system was developed under the condition of considering ABS sheet and mold as lumps. In order to get time-dependent temperature distribution of ABS sheet, another model was developed. The 1-d analysis codes can be widely used for designing the cooling system of thermoforming.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch on Layered Learning in Network Environment","authors":"Huang Dongming, Zheng Hua-an, Nie Zhen-wen","doi":"10.1109/ITCS.2010.143","DOIUrl":"https://doi.org/10.1109/ITCS.2010.143","url":null,"abstract":"The article analyzes the collaborative learning in network from four aspects: problems determination, information gathering, information processing and role shifting. Carry our teaching design according to different characteristics and enable the different learners obtain the development and the enhancement in own cognition level. Collaborative Learning Network is a learning method that divides the work among the members of cooperative, teachers attach importance to cooperation and guidance, at the same time, more attention should be paid to the network different, which brings differently to the learner request and the understanding.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"237-240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130731118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Realization of Flight Simulation System Based on OpenGL","authors":"Hong-ge Yao","doi":"10.1109/ITCS.2010.55","DOIUrl":"https://doi.org/10.1109/ITCS.2010.55","url":null,"abstract":"A visual simulation system for flight with virtual reality is designed and realized by OpenGL on Visual C++ platform. The flight environment virtual simulation system can simulate the flight rules in 3D space. In the system,the aircraft model is 3D and can be controlled. Also its poses can be displayed in 3D. The results of visual simulation show that this system is workable and effective. It is an important simulation environment for the study of the flight operation in the air and offers a very effective, economical means or approach for the research and development of other similar systems.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionResearch Off Electromice Commerce Security Evaluation","authors":"Shuliang Liu, Yanling Bai, Congyi Zou","doi":"10.1109/ITCS.2010.126","DOIUrl":"https://doi.org/10.1109/ITCS.2010.126","url":null,"abstract":"With the further promotion of e-commerce, e-commerce security issues which become increasingly prominent has become a major obstacle to development of electronic commerce. Solving the security issues of e-commerce has become the most important and basic work for development of electronic commerce. Therefore, this paper through the research for development status of e-commerce security, the main security issues and e-commerce security system and take Company for example, evaluates and analyzes qualitatively and quantitatively the security of enterprise e-commerce system reference to the method of fuzzy mathematics and makes a number of e-commerce to enhance corporate security-related measures with a view to identifying the risks of e-commerce companies and security management to provide some reference and reference. However, from the practical application point of view, there are a large number of complex work to be done for the use of evaluation model proposed in this paper, the further scientific improvement of e-commerce safety evaluation index system, and the further scientific improvement of evaluation system in each specific quantitative indicators, a more scientific and practical division for the level of e-commerce security, should be explored in future research work.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130905846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FLIR Image Denoising with Morphological Filters on Complete Lattice","authors":"Hu Xin, Duan Chen-dong","doi":"10.1109/ITCS.2010.146","DOIUrl":"https://doi.org/10.1109/ITCS.2010.146","url":null,"abstract":"In this paper, we propose a robust approach to denoise in forward looking infrared (FLIR) imagery taken from an airborne moving platform. We use morphological filters to reduce noise and clutter and better preserve important details. Based on target intensity and shape information, motion criteria, the proposed algorithm uses morphological filters by reconstruction to estimate background of image, and proposes adaptive nonlinear wavelet using the lifting scheme to remove Gaussian white noise. The experiments performed on FLIR image sequences, show the robustness of the proposed approach.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pairwise Key Management Scheme Using Sub Key Pool for Wireless Sensor Networks","authors":"Jianmin Zhang, Yu Ding","doi":"10.1109/ITCS.2010.13","DOIUrl":"https://doi.org/10.1109/ITCS.2010.13","url":null,"abstract":"Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Development on Experimental Teaching System for Computer Graphics","authors":"Ling Lu, Lei Wang, Yong Yang, Yin Gui","doi":"10.1109/ITCS.2010.104","DOIUrl":"https://doi.org/10.1109/ITCS.2010.104","url":null,"abstract":"A new experimental teaching system for computer graphical course was presented. In the system, the students may design programs about graphical methods and submit the experimental data and pictures to database. The system may automatically grade results about students’ experiment. The teacher can use handmade perusal. The system can not only educate students’ ability of study and design, but also raise teacher’s working efficiency.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}