{"title":"Automated segmentation of gallstones in ultrasound images","authors":"Shivi Agnihotri, Harsh Loomba, Abhinav Gupta, Vineet Khandelwal","doi":"10.1109/ICCSIT.2009.5234996","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234996","url":null,"abstract":"Gallstones are solid particles formed from bile in the gall bladder. In this paper, we propose a technique to automatically detect Gallstones in ultrasound images, christened as, Automated Gallstone Segmentation (AGS) Technique. Speckle Noise in the ultrasound image is first suppressed using Anisotropic Diffusion Technique. The edges are then enhanced using Unsharp Filtering. NCUT Segmentation Technique is then put to use to segment the image. Afterwards, edges are detected using Sobel Edge Detection. Further, Edge Thickening Process is used to smoothen the edges and probability maps are generated using Floodfill Technique. Then, the image is scribbled using Automatic Scribbling Technique. Finally, we get the segmented gallstone within the gallbladder using the Closed Form Matting Technique.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HMM based hand gesture recognition: A review on techniques and approaches","authors":"M. A. Moni, A. Ali","doi":"10.1109/ICCSIT.2009.5234536","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234536","url":null,"abstract":"Gesture is one of the most natural and expressive ways of communications between human and computer in a virtual reality system. We naturally use various gestures to express our own intentions in everyday life. Hand gesture is one of the important methods of non-verbal communication for human beings for its freer in movements and much more expressive than any other body parts. Hand gesture recognition has a number of potential applications in human-computer interaction, machine vision, virtual reality, machine control in industry, and so on. As a gesture is a continuous motion on a sequential time series, the HMMs (Hidden Markov Models) must be a prominent recognition tool. The most important thing in hand gesture recognition is what the input features are that best represent the characteristics of the moving hand gesture.This paper presents part of literature review on ongoing research and findings on different technique and approaches in gesture recognition using HMMs for vision-based approach.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative experiments to evaluate the use of a CHMM-based speaker identification engine for Arabic spontaneous speech","authors":"H. Tolba","doi":"10.1109/ICCSIT.2009.5234955","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234955","url":null,"abstract":"In this paper, we present a comparative study between two identification engines to identify speakers automatically from their voices when speaking spontaneously in Arabic. The first engine is based on the continuous hidden Markov models (CHMMs) while the second one is based on the artificial neural networks (ANNs). The Mel frequency cepstral coefficients (MFCCs) were selected to describe the speech signal. The general Gaussian density distribution HMM was developed for the CHMM-based engine. Elman network was developed for the ANN-based engine. A series of experiments to evaluate both engines have been carried out using a subset of an arabic database. The identification rate was found to be 100% for both engines during text dependent experiments. However, for text-independent experiments, the performance for the CHMM-based engine outperformed that of the ANN-based engine. The identification rates for the CHMM- and the ANN-based engines were found to be 80% and 50%, respectively.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"39 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studies on the design model and method of product identity based on image cognition","authors":"Linghao Zhang, Ming Ni","doi":"10.1109/ICCSIT.2009.5234923","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234923","url":null,"abstract":"The product identity is an important topic in modern design. However very little research on the cognition of product identity based on consumers' image and design model has been reported. This article has proposed the cognition concept of the product identity image, and analyzed the main method based on the image cognition. According to the features of the product identity, this study has employed some quantitative relation experiments such as semantic differential (SD), eye track observing, and qualitative analysis methods such as oral description, metaphor analysis, extracted the key features which affect the image identification and image cognition, and formed the feature database and the rule database of the image inferences. Taking this as the foundation, the study has established the prototype design model of the product identity from the input to the output, carried out the dual appraisals and the revision to the inference results using the identification model and the consumer model in the later period, and ensured the correct output.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method for component reuse","authors":"Jianli He, Rong Chen, Weinan Gu","doi":"10.1109/ICCSIT.2009.5234941","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234941","url":null,"abstract":"Achieving software reuse is a fundamental problem in software engineering. Component-based development (CBD) is widely accepted as a promising approach for software reuse. Current methods for component reuse concentrate primarily on the component consumer perspective, which are lack of the potential for component evolution itself. This paper proposes two complementary approaches to reusing existing components: binary class-level inheritance and feature composition. To meet variability requirements, a new component can be derived across component module from an old component. Furthermore, to narrow the gulf between the user and the developer perspectives, the system features are decomposed into a set of independent feature components that can be plugged into running object. The design and implementation method on component platform is presented. At last, this paper introduces the graphic user interface and mobile telephone projects development experiments that show the two approaches contribute to reuse.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation for E-paper driver","authors":"Qingcheng Li, Z. Bai, Jianzhi Liu, Jie Ma","doi":"10.1109/ICCSIT.2009.5234383","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234383","url":null,"abstract":"Display driver is a basic driver of a system, in order to port WINCE to the platform based on e-paper, we developed a E-paper driver for WINCE. This paper analyzed display characteristics of e-paper in detail and compared the Apollo controller with others. Considering the e-paper's refresh rate is too slow, we put forward a specific solution - a passive-refresh display strategy for the display controller- which has a much better user experience than refreshing at a slow static rate. In the end, we implemented the e-paper device driver for WINCE platform, which satisfies screen printing perfectly.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionInsignificancy of constraints on chinese entrepreneurs' behaviors","authors":"D. Yang","doi":"10.1109/ICCSIT.2009.5234793","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234793","url":null,"abstract":"Constraint mechanism for entrepreneurs' behaviors bear function of demarcate entrepreneurs' behaviors and maintain sound order of economic activities, and therefore it is indispensible institutional condition for corporate operation and market economic activities. This article discusses the restriction mechanism of the Chinese entrepreneurs from two aspects: external restrictions and internal restrictions, and it points out that the behavior of Chinese entrepreneurs lacks of restriction mechanism. What's more, the article has analyzed several major problems and makes some recommendations for improvement.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114616018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of PC-based EGSE platform for the SST payload","authors":"L. Fei-fei","doi":"10.1109/ICCSIT.2009.5234842","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234842","url":null,"abstract":"The Space Solar Telescope (SST) will carry five instruments as the payload on board a satellite, which imposes great challenges on the SST payload EGSE (Electrical Ground Support Equipment) development in both the engineering and technical aspects. To meet those challenges, a platform based EGSE development method is proposed. The basic principle is to develop the SST payload EGSE with a modular architecture and on a re-usable software platform. This paper describes the experiences gained during the preliminary design and implementation which was carried out in parallel with the hardware development.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data clustering method based on ant swarm intelligence","authors":"Y. Wang, Pengyuan Wei","doi":"10.1109/ICCSIT.2009.5234558","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234558","url":null,"abstract":"Clustering analysis based on ant swarm intelligence is discussed. As traditional clustering algorithm is easy to obtain local optimum, it uses ant swarm intelligence to obtain global search. It improves the clustering by locating the objects in a cluster with the probability, which is updated by the pheromone, while the rule of updating pheromone is according to total within cluster variance. According to the simulation results, the proposed algorithm outperforms several existing approaches such as GA, SOM.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Bayesian classifiers with GA for response modeling in direct marketing","authors":"Hongmei Shao, Gaofeng Zheng","doi":"10.1109/ICCSIT.2009.5234617","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234617","url":null,"abstract":"In this paper, a Bayesian classifier for modeling consumer response to direct marketing is constructed based on a novel genetic algorithm (GA). To evaluate the performance of this model, we test it with a large amount of validation data of direct marketing and compare the results with other benchmark methods, including Recency-Frequency-Monetary (RFM) analysis, Chi-Square automatic interaction detector (CHAID), Logistic regression (LR) and so on. The results demonstrate the superiority of this model over the others in terms of accuracy of prediction and interpretable of results. Recently, it has been adopted by a credit card company to effectively handle business problems.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}