{"title":"J2EE-based human resources s management information system design and implementation","authors":"Gui Ying, Tang Bin, Gao Xiao-hui","doi":"10.1109/ICCSIT.2009.5234604","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234604","url":null,"abstract":"In this paper, through the research on enterprise human resources s and software engineering theoretical knowledge, using J2EE platform technology, a new flexible, high-effect, expandable enterprise human resources s management system framework is designed and then implemented. This system not only can successfully resolve a large number of practical problems the enterprise human resources management faced to improve human resources management efficiency, but also the information system is simple and easy to implement, has strong features such as easy to expand, easy to maintain, flexible and secure.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124475878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of capacity optimizing model on wireless mesh networks","authors":"Shuqiang Huang, Qi-lun Zheng","doi":"10.1109/ICCSIT.2009.5234802","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234802","url":null,"abstract":"As a new type of wireless network architecture, because of its self-organization, and support multi-hop and heterogeneous networks, Wireless Mesh networks has played an important role in building “wireless cities” and become an research spot in academia and industry. In practical applications, network capacity is the most important need and high network throughput is the most important network performance parameter. As a wireless Mesh network basic issue, network capacity associates the physical characteristics of the network, topology, routing algorithm and channel allocation scheme at all levels. Aiming the question of wireless Mesh network capacity, the paper proposes a hierarchy optimization model from bottom to up and a series of optimization ways based on programming theory. the main content in this paper includes: (1) Optimizing link-channel scheduling strategy, studying the wireless Mesh network channel allocation algorithm, and an interference-based model and linear programming channel allocation and routing joint algorithm is proposed; (2) research of network scalability, taking into account the network coverage and performance at the same time, the paper presents a mixed integer nonlinear programming algorithm for the deployment of the AP; (3) research of gateway deploying strategy, a linear programming based heuristic algorithm gateway deployment is proposed. Research on these issues of network capacity optimization will improve the performance of networks and promote the development of wireless mesh networks; it also has certain significance in the engineering practice.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on distributed cooperative CAE analysis platform construction","authors":"Yongming Wang, Xiaoliu Yu","doi":"10.1109/ICCSIT.2009.5234429","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234429","url":null,"abstract":"Based on requirements analysis of distributed cooperative CAE, this paper proposed a distributed cooperative CAE analysis platform architecture, which has four functional modules and uses a three layered architecture: user layer, logic layer and data resource layer. Some key techniques used in the platform were discussed, including cooperative CAE analysis tools, cooperative CAE management tools, CAD/CAE integrated modeling techniques considering the finite element analysis features in CAD model, optimization method of operating speed and network security of the platform, which uses a multi-layered security architecture based on IP Security Protocol (IPSec), Virtual Private Network (VPN) and Security Socket Layer (SSL). The above-mentioned techniques support the Distributed Cooperative CAE analysis platform construction and operation.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125924007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junheng Huang, W. Zhang, Guangri Quan, Dongjie Zhu
{"title":"Semi-supervised visual object tracking by label propagation","authors":"Junheng Huang, W. Zhang, Guangri Quan, Dongjie Zhu","doi":"10.1109/ICCSIT.2009.5234885","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234885","url":null,"abstract":"Recently, object tracking is viewed as a foreground/background two-class classification problem. In this paper, we propose a non-parameter approach to model the observation model for tracking via graph, which is a semi-supervised approach. More specially, the topology structure of graph is carefully designed to reflect the properties of the sample's distribution during tracking. In predication, the confidence of sample's label is propagation via random walk with restart (RWR), which can utilize labeled or unlabeled samples easily. The primary advantage of our algorithm is that it keeps the appearance of object in graph model, which can easily model the multi-modal of object appearance. Experimental results demonstrate that, compared with two state of the art methods, the proposed tracking algorithm is more effective, especially in dynamically changing and clutter scenes.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nitish Aggarwal, Kartik Asooja, S. S. Verma, Sapna Negi
{"title":"An improvement in the restoring division algorithm (Needy Restoring Division Algorithm)","authors":"Nitish Aggarwal, Kartik Asooja, S. S. Verma, Sapna Negi","doi":"10.1109/ICCSIT.2009.5234956","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234956","url":null,"abstract":"An improvement in the current restoring computer division algorithm which minimizes the number of restorations performed by the computer. Currently, restoration is checked after each shifting of the register but Needy Restoring Division Algorithm checks restoration only when it is needed. The needless restorations are removed by the use of an extra register. This removal decreases the time for the division than taken in the current restoring division algorithm considerably.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124809021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Ranking Theory for Uncertain Data with Constraints","authors":"Chonghai Wang, Li-Yan Yuan, Jia-Huai You","doi":"10.1109/ICCSIT.2009.5234622","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234622","url":null,"abstract":"We develop a theory of top-K ranking for objects whose values may be uncertain, incomplete, or difficult to be characterized quantitatively, but between which some constraints may be required to be satisfied. We present our ranking theory for discrete space, continuous space, and the general case with probability distributions and complex constraints. The central question to be addressed is how to define the relative strengths of top-K object sequences. We show that top-K ranking defined this way in continuous space is closely related to the analysis and computation of high dimensional polyhedra, and as a consequence, the methods for the latter can be applied to compute the support ratios of top-K object sequences so that the best can be chosen.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124820791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature extraction for image recognition and computer vision","authors":"Xudong Jiang","doi":"10.1109/ICCSIT.2009.5235014","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5235014","url":null,"abstract":"Feature extraction and classifier design are two main processing blocks in all pattern recognition and computer vision systems. For visual patterns, extracting robust and discriminative features from image is the most difficult yet the most critical step. Several typical and advanced approaches of feature extraction from image are explored, some of which are analyzed in depth. Various techniques of feature extraction from image are organized in four categories: human expert knowledge based methods, image local structure based approaches, image global structure based techniques and machine learning based statistical approaches. We will show examples of applying these feature extraction approaches to solve problems of the image based biometrics, including fingerprint verification/identification and face detection/recognition. These illustrative application examples unveil the ideas, principles and advancements of feature extraction techniques and demonstrate their effectiveness and limitations in solving real-world problems.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved graph cuts for patch-based texture synthesis","authors":"Kun Zou, Yueqiao Li, Zan Li, Rong Li, Xiang Xu","doi":"10.1109/ICCSIT.2009.5234981","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234981","url":null,"abstract":"In the context of patch-based texture synthesis, this paper presents an improvement to the graph cut, a technique to optimize the patch boundaries in overlap regions. Instead of implementing the traditional minimum cut to minimize the accumulated errors along patch boundaries, a non-scalar metric is introduced to measure the errors of the cutting paths. According to this metric, the low-cost cuts tend to steer clear of high cost regions rather than taking short cuts through them, as can sometimes happen in the traditional minimum cut. Moreover, the resulting cutting paths are more circuitous and difficult to perceive by the human eye. Accordingly, a fast algorithm is proposed to conduct this new minimum cut. Experimental results show that the improved graph cuts produce more seamless textures.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining wavelet transform and Orthogonal Centroid Algorithm for ear recognition","authors":"Zhao Hai-long, Mu Zhi-chun","doi":"10.1109/ICCSIT.2009.5234392","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234392","url":null,"abstract":"In recent years, automatic ear recognition has become a popular research. Effective feature extraction is one of the most important steps in Content-based ear image retrieval applications. In this paper, a new approach is proposed that the low frequency sub-images are obtained by utilizing two-dimensional wavelet transform and then the features are extracted by applying Orthogonal Centroid Algorithm to the low frequency sub-images. The experimental results on USTB ear database prove that the proposed method can overcome the Small Sample Size problem and get better performance of recognition speed than conventional PCA+LDA algorithm.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic pattern based performance comparison of two reactive routing protocols for Ad hoc networks using NS2","authors":"Suresh Kumar, R. Rathy, D. Pandey","doi":"10.1109/ICCSIT.2009.5234702","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234702","url":null,"abstract":"Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operations and ease of deployment. Routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. We compare two reactive routing protocols by considering multiple performance metrics to bring out their relative merits. Both DSR and AODV share similar on demand behavior, but the protocols internal mechanism leads to significant performance differences. We have analyzed the performance of protocols by varying network load, mobility and type of traffic (CBR, TCP). A detailed simulation has been done using NS2. We consider packet delivery fraction, normalized routing load, average delay, routing overhead, and packet loss as metrics for performance analysis of these protocols.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}