2007 International Conference on Computational Science and its Applications (ICCSA 2007)最新文献

筛选
英文 中文
The QR-code reorganization in illegible snapshots taken by mobile phones 用手机拍摄的难以辨认的快照中的qr码重组
A. Sun, Yan Sun, Caixing Liu
{"title":"The QR-code reorganization in illegible snapshots taken by mobile phones","authors":"A. Sun, Yan Sun, Caixing Liu","doi":"10.1109/ICCSA.2007.86","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.86","url":null,"abstract":"In this paper, we give an algorithm for the analysis and correction of the distorted QR barcode (QR-code) image. The introduced algorithm is based on the code area finding by four corners detection for 2D barcode. We combine Canny edge detection with contours finding algorithms to erase noises and reduce computation and utilize two tangents to approximate the right-bottom point. Then, we give a detail description on how to use inverse perspective transformation in rebuilding a QR-code image from a distorted one. We test our algorithm on images taken by mobile phones. The experiment shows that our algorithm is effective.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114681163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
VLSI-Oriented Architecture for Two's Complement Serial-Parallel Multiplication without Speed Penalty 面向vlsi的无速度损失双补串行并行乘法体系结构
S. Moh
{"title":"VLSI-Oriented Architecture for Two's Complement Serial-Parallel Multiplication without Speed Penalty","authors":"S. Moh","doi":"10.1109/ICCSA.2007.56","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.56","url":null,"abstract":"A serial-parallel multiplier computes a product by multiplying a parallel input and a serial (or online) input. Serial-parallel multipliers are frequently used in digital communication systems, digital signal processing, on-line computing applications, and embedded computing and communication systems. In this paper, a VLSI-oriented, size-efficient two's complement serial-parallel multiplication architecture is proposed. In addition to its smaller size, it is also suitable for VLSI implementation because it consists of modularized logic cells and locally interconnected signals. According to the analysis results for 2- to 32- bit multiplication, the proposed architecture requires up to 30 percent smaller size without speed penalty compared to the previous architecture.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116188063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unsteady Cavitation and Cryogenic Flow Cavitation around 2D Body 二维体周围非定常空化与低温流动空化
Seyoung Lee, Changjin Lee, Soohyung Park
{"title":"Unsteady Cavitation and Cryogenic Flow Cavitation around 2D Body","authors":"Seyoung Lee, Changjin Lee, Soohyung Park","doi":"10.1109/ICCSA.2007.49","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.49","url":null,"abstract":"Since the coupling of cavitation modeling with turbulent flow is the difficulty topic, a numerical simulation for two phase flow remains as one of the challenging issues in the society. This research focuses on the development of numerical code to deal with incompressible two phase flow around 2D hydrofoil combined with cavitation model suggested by Kunz et al. with k-epsiv turbulent model. The simulation results are compared to experimental data to verify the validity of the developed code. Also, the comparison of the calculation results is made with LES results to evaluate the capability of conventional turbulence models such as k-epsiv model. The calculation results show very good agreement with experimental observations even though this code can not grasp the small scaled bubbles in the calculation whereas LES can hold the real physics. Also, the calculation of cavitation in cryogenic fluid was done by implementing the temperature sensitivity in government equations. Even though the results show good agreement with previous calculation results, further research will be needed to account for real physics of the formation of cavitation in cryogenic fluid due to temperature sensitivity. This code will be further extended to 3D compressible two phase flow for the study on the fluid dynamics around inducers and impellers in turbo pump system.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Software Adaptation with Dependence Analysis for Multi-Agent Platform 基于依赖分析的多智能体平台动态软件适配
S. Han, Sung-Keun Song, H. Youn
{"title":"Dynamic Software Adaptation with Dependence Analysis for Multi-Agent Platform","authors":"S. Han, Sung-Keun Song, H. Youn","doi":"10.1109/ICCSA.2007.50","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.50","url":null,"abstract":"Modern software system is required to be flexible and adaptable to deal with dynamic environment. To address this new requirement, meta-level architecture description-based dynamic software adaptation has been proposed, which refers to the software system changing its structure and behavior at runtime without user intervention. In this paper we propose an approach for multi-agent system offering dynamic agent adaptation by runtime reconfiguration. The proposed runtime agent adaptation process employs the matrix-based dependence analysis model to check if the performance requirement is satisfied by the reconfiguration. It will thus simplify the development, deployment, and maintenance of the system using the adaptation facilities. An agent platform employing the proposed approach has been implemented, which complies with the FIPA specification.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Study of Superdistribution Model for Family Domain in DRM System DRM系统中族域超分布模型的研究
Bohyun Wang, Zonghua Liu, Byungwook Lee
{"title":"A Study of Superdistribution Model for Family Domain in DRM System","authors":"Bohyun Wang, Zonghua Liu, Byungwook Lee","doi":"10.1109/ICCSA.2007.48","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.48","url":null,"abstract":"The traditional superdistribution model supports the contents distribution only between users. In this paper, we are presenting the enhanced superdistribution model in order to support the fair use of contents as including the content distribution within family domain as well. Family domain consists of user owned devices. In addition that we propose the license model, using information of distribution history for the secure management of the enhanced superdistribution. The history information is composed of device identifiers. The use of history information makes the contents used only in granted superdistribution and family domain. The history information is protected with asymmetric encryption method to prevent from privacy information leakage. The enhanced superdistribution model and the proposed license model are applicable for the various types of fair use for user and those models enable providers to develop new business models.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture of a SCORM-Compliant Assessment Authoring Tool 符合scorm的评估创作工具的体系结构
K. Parmar, R. Anane, R. Hendley
{"title":"Architecture of a SCORM-Compliant Assessment Authoring Tool","authors":"K. Parmar, R. Anane, R. Hendley","doi":"10.1109/ICCSA.2007.40","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.40","url":null,"abstract":"Compliance with standards is often put forward as a fundamental requirement for the widespread adoption of e-learning frameworks. Among the advantages that accrue from the conformance to standards interoperability and reuse have acquired special significance. This paper is concerned with the presentation of a SCORM-compliant assessment- authoring tool. The tool is designed and implemented as a stand-alone system, which can be integrated into a SCORM-compliant learning management system as a plug-in. A layered approach to system design was adopted as a way of satisfying a hierarchy of requirements. Convenience and usability in creating assessment content are enhanced by hiding the complexity of the underlying system, making transparent the conformance to e-learning standards and minimising user interaction. The system is put into perspective through a comparison with the QTI approach to assessment creation.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identifying Traceability between Feature Model and Software Architecture in Software Product Line using Formal Concept Analysis 用形式概念分析识别软件产品线中特征模型和软件体系结构之间的可追溯性
T. K. Satyananda, Danhyung Lee, Sungwon Kang, S. I. Hashmi
{"title":"Identifying Traceability between Feature Model and Software Architecture in Software Product Line using Formal Concept Analysis","authors":"T. K. Satyananda, Danhyung Lee, Sungwon Kang, S. I. Hashmi","doi":"10.1109/ICCSA.2007.59","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.59","url":null,"abstract":"Feature models have been used to support requirements analysis and domain engineering in Software Product Line. By identifying the mapping between feature model and architecture model by capturing the relationships among elements in the models, we can establish the traceability between the two models. The identified traceability can be used to verify consistency between feature model and architecture model. On small scale models, the relationships among elements can be easily identified by manually analyzing the descriptions of models. But when the complexity of a model is high, a more formal approach will be useful to help identifying the traceability. In this paper, we develop an approach to identify traceability between feature model and component and connector view of software architecture using formal concept analysis (FCA) technique. This technique constructs a concept lattice structure. We propose several analysis criteria for concept lattice structure to identify traceability between the two models.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
NSA simplification algorithm: geometrical vs. visual quality NSA简化算法:几何vs.视觉质量
Frutuoso G. M. Silva
{"title":"NSA simplification algorithm: geometrical vs. visual quality","authors":"Frutuoso G. M. Silva","doi":"10.1109/ICCSA.2007.66","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.66","url":null,"abstract":"The model simplification algorithms have a great interest in a variety of areas, since it allow the replacement of large models by approximations with far fewer cells for manipulation and visualization purposes. The quality of the simplified models and the execution times are the main aspects to distinguish the algorithms. Normally the quality evaluation is based on the analysis of geometrical errors of the simplified models but it is not enough to evaluate the visual quality of simplified models. This paper presents a edge collapsing-based simplification algorithm, called NSA, for polygonal models that is faster than the other algorithms found in the literature that use the edge collapse operation. However it makes a good trade-off between time performance and mesh quality. Besides, in some cases, the visual quality of simplified models created by NSA algorithm is superior to the visual quality of simplified models created by other algorithms, particularly for models that have planar zones (CAD models). Some results are compared between NSA and QSlim algorithms to illustrate the geometrical and visual quality of simplified models.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images 基于双色图像综合统计分析的手写签名认证方案
D. Bhattacharyya, S. Bandyopadhyay, D. Choudhury
{"title":"Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images","authors":"D. Bhattacharyya, S. Bandyopadhyay, D. Choudhury","doi":"10.1109/ICCSA.2007.15","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.15","url":null,"abstract":"In this paper, we propose data hiding, extraction and handwritten signature authentication algorithms for binary images. Handwritten signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed data hiding algorithm. According to the algorithm, size of the carrier image must be double (or more) the size of source image. If necessary then additional bytes or noise needed to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). There are numerous biometric authentication methods also proposed. In this paper, we propose a novel and new alternative. Entire work can be divided into two phases- a. security on transmission; and b. Recognition and authentication. Our scheme supports the application environment and we strongly believe that \"user authentication by statistical analysis\" could be a solid platform for future research and study. This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media. This work is focused on authentication of handwritten signature.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Holograph Interferomatery for Modelling Rate Change of Shoreline from Airsar Data 利用Airsar数据模拟海岸线速率变化的全息干涉法
M. Marghany, M. Hashim, A. Cracknell
{"title":"Holograph Interferomatery for Modelling Rate Change of Shoreline from Airsar Data","authors":"M. Marghany, M. Hashim, A. Cracknell","doi":"10.1109/ICCSA.2007.89","DOIUrl":"https://doi.org/10.1109/ICCSA.2007.89","url":null,"abstract":"This work is introducing a new approach for modeling shoreline change rate from AIRSAR Cvv- band. The hologram algorithm has been applied to simulate the wave spectra propagation pattern. In addition, Doppler frequency and azimuth cut off models are used to model longshore current movement and rate change of sediment transport volume. The results show that the phase information of AIRSAR hologram image can be used to simulate the wave refraction pattern. Furthermore, the Shoreline change rate is less than -0.5m /day which indicates an erosion event with accuracy error of plusmn 0.05 m/day.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信