The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Organizing Committee, I would like to welcome all of you to ICCASM 2010. This is a conference Co-organized by North University of China, Institute for Electrical and Electronic Engineers in U.S.A.(IEEE), and International Association of Computer Science and Information Technology (IACSIT), co-sponsored and supported Shanxi University, Taiyuan University of Technology, Taiyuan University...
In this paper, a new method of inspecting fruit quality is proposed based on color image processing. After an image of fruits is taken, white balance is performed. Then the image is transferred from the RGB color model to the HSI color model. Its simplified histograms of hue H and saturation S are calculated as the input of a designed BP network. The output of the BP network is the quality description...
In the open environment of the Internet, E-commerce developes fast. How to transfer data securely and efficient is the key to the development of E-commerce. This paper analyses the security technology and proposes the security model based on PKI and digital signature.
Based on the technology of computer vision, a low-cost multi-touch whiteboard system has been developed. This paper firstly introduces the whole structure of the whiteboard system, then discusses the details of the system, including the design of the hardware, the middleware and the application software, and finally indicates a fast blob tracking algorithm. The experiment result shows that the system...
Digital home network has developed rapidly in recent years, but existing security mechanism against external attacks rather than internal attacks restrict its further development. In this article, we introduce TCM, trusted network connection and digital certificate mechanism into digital home system architecture to propose architecture of the trusted digital home system, so that extend the trust mechanism...
In this paper, a type of improved hybrid strategy is used to carry out the image segmentation of gold immunochromatographic test strip, which combines the genetic simulated annealing algorithms (GSAAs) and error back propagation (EBP) neural network algorithm. This hybrid strategy can work out these problems in image segmentation of gold immunochromatographic test strip: the area of test strip is...
A highly robust chaotic synchronization scheme is proposed in this paper. Different from most synchronization scheme, the two continuous chaotic systems is not driven by each other, but the separated standard digital chaotic systems. Since the digital chaotic systems are not affected by the internal noise and external noise, our synchronization scheme is much more robust than other synchronization...
Taking Guangrao county of Shandong Province as an example, authors expatiate geological background for salt and fresh water formation, and formation and evolvement for transition-zone of salt and fresh water, analyze the history and actuality of salt water intrusion arisen by extensive groundwater exploitation, forecast intrusion trend for salty water using indeterminacy model method, and point out...
The 3-D substantial model is built for the bushing end of an ultra-high voltage transformer high-voltage coil and the surrounding of the equipotential shielding. This model is properly simplified according to the symmetrical structure of the coil. The electric field intensity nearby the transformer's high-intense coil and the surrounding of the equipotential shielding are calculated on the basis of...
The execution of web applications always involves many levels (Operating system, Java virtual machine, Web server, Database server, application itself). Each level can produce its corresponding logs, which record the information of the level's running state and history. Based on the multi-level logs generated by the running web systems, this paper proposes a comprehensive method to evaluate and analyze...
In this paper, we introduce the concept of Edge Linking Coefficient(ELC), which is a value positively proportional to the number of the common neighbors shared by a pair of connected nodes and used as the measurement of the connection strength between them, and present a new divisive clustering algorithm for discovering communities hidden in large-scale complex networks based on it. Combining with...
This paper presents an efficient multi-mode weight selection method for joint prediction based coding. This scheme makes use of multi-mode joint prediction of motion estimation/disparity estimation (ME/DE) instead of existing three-mode prediction for reconstructing a target image. Moreover, a fast ME/DE approach is introduced in order to improve the coding speed based upon the correlation between...
This paper analyzes the mechanism of supply chain network construction in particular partner selection, simulate the evolution of the supply chain network formation process using of multi-agent simulation. And base on the complex network theory we give the statistical analysis of the final supply chain network under different partner selection mechanism. We obtain some interesting results: With the...
Graphics cluster based parallel rendering has been widely used in computer aided design, scientific visualization, geometry scene rendering, virtual reality and so on. The key to high performance on graphics cluster is rendering task distribution strategy. According to multi-stream based data organization in Direct3D, this paper has presented sort-first multi-steam based rendering task distribution...
IP Multimedia Subsystem (IMS) not only inherits the telecom advantages, but also brings several disadvantages, such as poor scalability, single point of failure, etc. Peer-to-Peer (P2P) network has the advantage of scalability and robustness, but there are some difficulties in the peer management and route optimization. By reusing the mechanism of signaling control and media negotiation in IMS, P2P...
Anti-virus software is a most common method for protecting the security of Desktop operating system. However, they fall prey to a number of shortcomings such as fully depend on and need to update the virus-database frequently, long scanning time, and their inability to prevent the unknown attacks. Aiming at these, in this paper we propose a novel anomaly behavior blocking approach based on the process...
The formation restoration method is an essential technique in geology. This paper studies the basic theories and essential techniques of formation restoration. Based on the practical geological exploration, the original borehole sample data are collected and processed. After being standardized they are used to establish the fact database. Based on analyzing the basic geology law, a hierarchy knowledge...
This paper first presents a flame simulation method in two-dimensional space based on particle system, and it simulates different state at different part of flame mainly using the number of overlapped particles. Based on the two-dimensional method this paper presents a model of simulating flame in three-dimensional space. We implemented both methods and got better and more realistic effect of flame.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.