By Topic

Information Technology and Computer Science, 2009. ITCS 2009. International Conference on

Date 25-26 July 2009

Go

Filter Results

Displaying Results 1 - 25 of 159
  • [Front cover - Vol 2]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1424 KB)  
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2009 , Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (188 KB)  
    Freely Available from IEEE
  • Message from Conference Chairs - Volume 2

    Publication Year: 2009 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2009 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Program Committee - Volume 2

    Publication Year: 2009 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • Reviewers - Volume 2

    Publication Year: 2009 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (149 KB)  
    Freely Available from IEEE
  • Research on Kernel-Based Feature Fusion Algorithm in Multimodal Recognition

    Publication Year: 2009 , Page(s): 3 - 6
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1088 KB) |  | HTML iconHTML  

    Ear and face based multimodal recognition could fully utilize their connection relationship, and implement recognizing people without their cooperation because of earpsilas special physiological location and structure. In this paper a kernel-based feature fusion algorithm is presented and applied to multimodal recognition based on fusing ear and face. With the algorithm, the associated feature vec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Application of Virtual Ancient Culture Exhibition

    Publication Year: 2009 , Page(s): 7 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1253 KB) |  | HTML iconHTML  

    Aiming at solving the problems of ldquolacking human spiritsrdquo in culture education, this paper presents a virtual learning environment to promote the development of culture education. It analyses the theory on the design of virtual exhibition, using distributed virtual reality to design an ancient culture exhibition and discussing the application of the system in culture education. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Hiding Algorithm Based on Predictive Coding

    Publication Year: 2009 , Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1032 KB) |  | HTML iconHTML  

    In view of the information security questions, the information hiding technology already becomes the hot spot in the research field. On the basis of the predictive coding, an algorithm using the prediction error to carry on the information hiding is proposed in this paper. In order to restrain the error diffusion which possibly appears during the anti-predictive coding in the information hiding pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Unsatisfiability of Nonlinear Constraints Using DISCOVERER

    Publication Year: 2009 , Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (600 KB) |  | HTML iconHTML  

    Recent advances in program verification indicate that various verification problems can be reduced to semialgebraic system (SAS for short) solving. An SAS consists of polynomial equations and polynomial inequalities. L.Yang invented new theories and algorithms for SAS solving and partly implemented them as a real symbolic computation tool in Maple named discoverer. In this paper, we first introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Customer Management in EMS Based on RFM

    Publication Year: 2009 , Page(s): 19 - 23
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1042 KB) |  | HTML iconHTML  

    EMS service is an important operation in China Post and is growing fast in the past years. At the same time, there are tremendous competitions for customers sharing EMS service, which requires China Post to retain the existing customers and attract the potential customers based on understanding the characteristics of the customers. However, to meet the end, customers must be segmented above all. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Grid-Based Geometric Correction for Remote Sensing Image

    Publication Year: 2009 , Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1150 KB) |  | HTML iconHTML  

    On the base of studying and analyzing the Globus Toolkit2.4 platform and remote sensing technology, this article uses the grid platform Globus Toolkit2.4 and the mode of parallel processing, develops a method of geometric correction for processing remote sensing images based on grid. It provides an approach for solving problems caused by RS imagepsilas characteristics of complexity and time consum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research and Development of Fitness Equipment Embedded System Based on Distributed Virtual Environment

    Publication Year: 2009 , Page(s): 28 - 31
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (646 KB) |  | HTML iconHTML  

    In order to solve the problem that existing fitness equipment has a single function, the lack of entertainment and interactive features, the intelligent fitness equipment embedded systems with a fitness and recreation dual function is researched and developed by distributed virtual technology. And the paper raises the embedded system architecture, hardware and software framework for the fitness eq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Knowledge Reasoning for Threat Assessment in the Battlefield

    Publication Year: 2009 , Page(s): 32 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1233 KB) |  | HTML iconHTML  

    Knowledge reasoning, in which knowledge acquisition and reasoning strategy are key techniques, is one of the most important methods applied to threat assessment. Based on the specialty of threat assessment in complex battlefield environment, an information system of threat assessment was built. Then the knowledge in the form of minimized production rules that contained the expert experience was mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Tag Antenna for RFID System

    Publication Year: 2009 , Page(s): 36 - 39
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1051 KB) |  | HTML iconHTML  

    Tag antenna can make RFID tags be read at a distance and do not require a line of sight between tag and reader. This paper describes design and optimization aspects of antenna coil of tag for RFID system in High Frequency (HF) band. An equivalent circuit of tag is established and a new detailed design method is demonstrated. An experimental formula with high efficiency is used to calculate the ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Protocol for Determining the Meeting Points of Two Intersected Circles

    Publication Year: 2009 , Page(s): 40 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (582 KB) |  | HTML iconHTML  

    Secure multi-party computation (SMC) deals with the problem of secure computation among participants who are not trusted by others. Privacy preserving computational geometry is a special area in SMC and has been applied to various of areas such as military, commerce and governments et al. In this paper, we will propose an efficient secure protocol, which is based on numerical computation, for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Hyper Elliptic Curve Digital Signature

    Publication Year: 2009 , Page(s): 45 - 47
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1057 KB) |  | HTML iconHTML  

    In computer cryptography, hyper elliptic curve cryptography system is one of the best cryptography system. DSA signature algorithm is also an advanced digital signature algorithm. In this paper, itpsilas banded hyper elliptic curve cryptography system and DSA signature standard together based on analysis and study them. The digital signature algorithm and the digital validate algorithm are analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Meta Communication Protocol in Support Lighting Device Unified Access of Olympic Center

    Publication Year: 2009 , Page(s): 48 - 52
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1129 KB) |  | HTML iconHTML  

    The scene lighting of the Center of Beijing 2008 Olympic Games calls for a lot of lighting devices which are of different types and different communication protocols. The problem that how to standardize these communication messages of devices which use different communication protocols to accomplish unified access of these devices has become one of the most important challenges. To solve these pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pedestrian Detection and Tracking Algorithm Design in Transportation Video Monitoring System

    Publication Year: 2009 , Page(s): 53 - 56
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1355 KB) |  | HTML iconHTML  

    Recently, the video-based technologies play an important role in monitoring fields, including the detection, identification and tracking of moving object. This paper designs an effective pedestrian detection and tracking algorithm in the traffic environment. Firstly, extract the moving prospect from the background in the video images, using conventional frame difference algorithm. The moving targe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Synchronous Triggering Technology for Wireless Measuring System

    Publication Year: 2009 , Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1280 KB) |  | HTML iconHTML  

    To test and measure the field signal, the nodes of wireless measuring system are necessarily deployed in the signal source area. The nodes must cooperate with other nodes to sample the field signal at one same time, so the starting sampling action in the system needs one actuate time benchmark. Therefore a special approach based on wireless mode is proposed in this paper to provide the actuate tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-layered Multicast Based on Competition Probability

    Publication Year: 2009 , Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1118 KB) |  | HTML iconHTML  

    Intra-layered multicast uses fixed sending rate interval for each layer, and a delegate of the receivers is selected in the layer for adjusting the layerpsilas sending rate. Sender adjusts layerpsilas sending rate within the layer rate interval according to the delegatepsilas rate. A scheme based on competition probability formula for delegate selection is proposed in this paper. Two factors deter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Wooden Pillar Features from Point Cloud

    Publication Year: 2009 , Page(s): 65 - 68
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1126 KB) |  | HTML iconHTML  

    For huge quantity of point cloud data gotten from ancient buildings, the common algorithms (e.g. the Hough Transform) can do extract relative features but their efficiency and time expense are not acceptable. In order to improve the data process efficiency and reconstruct their 3D models quickly, more effective and more practicable algorithms should be developed. Here introduce a new algorithm for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.