2009 ISECS International Colloquium on Computing, Communication, Control, and Management

8-9 Aug. 2009

Go

Filter Results

Displaying Results 1 - 25 of 168
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1347 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (405 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Content

    Publication Year: 2009, Page(s):iii - xi
    Request permission for commercial reuse | PDF file iconPDF (433 KB)
    Freely Available from IEEE
  • Message from the CCCM 2009 conference chair

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (408 KB)
    Freely Available from IEEE
  • CCCM 2009: Organizing committee

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • CCCM 2009 reviewers

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • CCCM 2009 keynote speech

    Publication Year: 2009, Page(s):xv - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New non-equal-interval direct optimizing verhulst GM(1,1) model that x(n) be taken as iinitial value and its application

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    The non-equal-interval direct optimum Verhulst GM(1,1) model was built which extended equal interval to non-equal-interval and suited for general data modeling and estimating parameters of direct Verhulst GM(1,1) by optimizing the background value. The new model need not pre-process the primitive data, accumulated generating operation (AGO) and inverse accumulated generating operation (IAGO). It w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To design logic circuits by using symmetrical coordinate

    Publication Year: 2009, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Limited to the methods used before in designing logic circuits, not a same tool could be used to design both the combined circuits and the time-sequential circuits. The symmetrical coordinate system stated in this article can be constructed to represent various states of multi-dimensional logical variables. Using the symmetrical coordinate system, it is not only possible to complete the design of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel non-equidistant GM(1,1) model with modified x(tn) taken as the initial value for line-drawing data processing

    Publication Year: 2009, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Based on the exponential trait of grey model and the definition of integral, the reconstruction method of GM(1,1) model's background value function of nonequal distance sequence was put forward, the approximately expressions of parameters of the background value function were obtained, and a kind of nonequidistant optimum grey model GM(1,1) with modified x(tn) taken as the initial value... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative model for network security situation awareness based on immunity and grey theory

    Publication Year: 2009, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    To effectively evaluate and predict network security situation, a quantitative model for network security situation awareness based on artificial immune system and grey theory is proposed. In this model, the formal definitions of self, non-self, antigen and detector is given. According to the relationship between the antibody-concentration of memory detector and the attack intensity of network, ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy evaluation on the safety of belt conveying system based on membership degree transformation new algorithm — M(1,2,3)

    Publication Year: 2009, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    The core of fuzzy evaluation on the safety of belt conveying system is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy evaluation on mining investment decision based on membership degree transformation new algorithm — M(1,2,3)

    Publication Year: 2009, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Mining investment is a kind of venture capital, the risk level of which is impacted by various factors. There are still a lot of uncertainty and ambiguity in the process of evaluating on mining investment decision, so it is more suitable to use fuzzy evaluation methods for it. The core of fuzzy evaluation is membership degree transformation. But the existing transformation methods should be questi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized packet-loss-ratio-based topology control for IEEE 802.11-based Ad hoc networks

    Publication Year: 2009, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Topology control for maximizing network capacity for the practical power-fixed IEEE 802.11-based ad hoc networks is deeply investigated in this paper. Several interference-model-based algorithms have been proposed to maximize network capacity through reducing interference during recent years. However, most of those algorithms are based on node location and not practical in IEEE 802.11-based ad hoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development of swimming athletes' physical fitness monitor system

    Publication Year: 2009, Page(s):34 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    The monitor process of athletes' training function is the basis to make the training move towards the preset aims. It also plays a key role in improving athletic ability, preventing exercise-induced fatigue and swift recovery. In order to make the monitor process in swimming training intelligent, automatic and dynamic, a monitor software has been developed based on Visual Basic 6.0 and Microsoft A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of parking guidance and information system in Shenzhen city

    Publication Year: 2009, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Shenzhen City is considering to deploy a Parking Guidance and Information System (PGIS) to provide drivers with real-time parking information to solve urban traffic problems caused by the lack of parking spaces. The paper discusses the implementation of a PGIS for the Shenzhen centre area. An approach to PGIS planning and design in this area is presented. Firstly, this paper analyzes the objective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamentals of intelligent public transportation dispatching systems planning

    Publication Year: 2009, Page(s):41 - 44
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    An urgent problem facing urban management departments and public transport enterprises has been how to dispatch and manage public transit vehicles in an efficacious way and how to develop the Strategy of Public Transport Priority in China. For the purpose of upgrading public transportation service and shortening the travel time of passengers, great importance should be attached to studies on the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of physiognomy morphological characteristics based on 1:10000 DEM of huangshui river basin

    Publication Year: 2009, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (835 KB) | HTML iconHTML

    In the terrestrial surface where the fluvial process is the most important external force, the water flows from high position to low make concave and convex on the surface, which form clear watershed and channel, thereby constituting different grade basin system, so altitude, slope, aspect are important terrain factors that affect the development of basin system. Based on the data collection of 1:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on weakening the bullwhip effect of supply chains based on game theory

    Publication Year: 2009, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    The Bullwhip Effect is an observed phenomenon in forecast-driven distribution channels. In supply chains, the Bullwhip Effect is also known as demand variability amplification, that is, the product demand fluctuations in the level of orders for products in supply chains is much larger than the actual market changes in the level of sales, and upstream along the supply chains to enlarge. The paper t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An item based collaborative filtering using item clustering prediction

    Publication Year: 2009, Page(s):54 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Personalized recommender systems are producing recommendations and widely used in the electronic commerce. Collaborative filtering technique has been proved to be one of the most successful techniques in recommendation systems in recent years. However, most existing collaborative filtering based recommendation systems suffered from its shortage in scalability as their calculation complexity and sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing of collaborative filtering using clustering technology

    Publication Year: 2009, Page(s):57 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Collaborative filtering recommender systems which automatically predict preferred products of a customer using known preferences of other customers have become extremely popular in recent years. Recommending products based on similarity of interest is also attractive for many domains such as books, CDs, movies, etc., and reducing the information over load in the electronic commerce environments. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical uyhur POS tagging with TAG predictor for unknown words

    Publication Year: 2009, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Automatic text tagging is an important component in higher level analysis of text corpora, and its output can be used in many natural language processing applications. Trigrams tags is an efficient statistical part-of-speech tagging. This paper describes a POS tagging for Uyhur text based on hidden Markov model using trigrams tags. We describe the basic model of Trigrams Tags, the techniques used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new segmentation algorithm with the fisher criterion function

    Publication Year: 2009, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    This paper introduced the image segmentation algorithm based on the Fisher criterion function and developed genetic algorithm. We carry out the simulation experiment on the human body blood cell. The simulation results show that the new algorithm not only segment the image satisfactorily with strong anti-noise ability, but also run efficiently. The developed genetic algorithm can find the global o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy mathematics' application in marking examination papers

    Publication Year: 2009, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    The core theory of this article is solving the problem of marking examination papers using Fuzzy similarity selection of Fuzzy mathematical theory. The method considers not only the scores given by every teacher but also every teacher's weigh value. We can give a reasonable and fair method of marking examination papers using this method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.