By Topic

Computer Engineering and Technology (ICCET), 2010 2nd International Conference on

Date 16-18 April 2010

Go

Filter Results

Displaying Results 1 - 25 of 180
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (15152 KB)
    Freely Available from IEEE
  • Proceedings

    Publication Year: 2010, Page(s):i - xviii
    Request permission for commercial reuse | PDF file iconPDF (212 KB) | HTML iconHTML
    Freely Available from IEEE
  • Uterine fibroid segmentation on multiplan MRI using FCM, MPFCM and morphological operations

    Publication Year: 2010, Page(s):V7-1 - V7-5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    Uterine fibroid is the most common benign tumor of the female in the world. Uterine volume measurement before and after surgery has an important role in predict and following the result of surgery. Fibroids segmentation in patient with multi fibroids is the challenging task manually. We propose tow step method for robustly segmentation of these cases. The first step results in a uterine segmentati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A new approach for supplier selection decision making

    Publication Year: 2010, Page(s):V7-6 - V7-8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Evaluating MBA students satisfaction that using multimedia learning system (MMLS) in the private university Malaysia

    Publication Year: 2010, Page(s):V7-9 - V7-11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2626 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A comparison of the Zippo lighter sales between real outlets and online shop

    Publication Year: 2010, Page(s):V7-12 - V7-14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast surface reconstruction algorithm for 3D unorganized points

    Publication Year: 2010, Page(s):V7-15 - V7-18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    This paper puts forward a fast method of surface reconstruction. Power crust algorithm can reconstruct a good surface that is topological valid and be proved theoretically. But its running time is long. This paper proposes a non-uniformly sampling method to resample the input data set according to the local feature size before reconstruction. Experimental results show that the efficiency of the al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast algorithm for point-sampled model denoising

    Publication Year: 2010, Page(s):V7-19 - V7-22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    Denoising is an essential step in creating perfect point-sampled models. The image mean-shift filtering has been extended to 3D surface smoothing by taking the vertex normal and curvature as range component and the vertex position as the spatial component, which is not efficient. For the reason, this paper proposes to use quasi-Cauchy kernel to replace the Gauss kernel used in the Guofei. Hu'algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical data replication method in ad hoc networks

    Publication Year: 2010, Page(s):V7-23 - V7-27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Data replication is an effective way to improve data accessibility in ad hoc networks because of the movement of hosts and the changing of network topology. A new data replication method called Hierarchical Replication Model (HRM) is proposed in this paper. This method selects mobile hosts as data replicas holders taking into account not only data access frequencies and network topology, but also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A text-message filtering system design based on ACE platform

    Publication Year: 2010, Page(s):V7-28 - V7-31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    Text-message is a very important component of mobile industry, and it makes communication faster and more convenient. However, the junk text message really does a lot of harm to mobile users, mobile carriers, and the society at large. In this paper, we design a text-message filtering system which use ACE platform's abundant packages and frames, as well as its portability. This manuscript describes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Effect of stiffness on non-guide-roll radial ring rolling system

    Publication Year: 2010, Page(s):V7-32 - V7-36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of traffic control MIPv6 on Linux base

    Publication Year: 2010, Page(s):V7-37 - V7-41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2834 KB) | HTML iconHTML

    Application on mobile device and wireless are popularly used. Such as Multimedia, VDO Conference, VoIP need different bandwidth. In order to support real-time and data streaming application. This paper analysis of traffic control and performance classes Mobile IPv6 (MIPv6). Author implement on Redhat Linux OS and test to control resource on Access Router (AR) by Differentiated Service (Diffserv) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    WebQuest teaching and research in vocational education

    Publication Year: 2010, Page(s):V7-42 - V7-45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection in network traffic and role of wavelets

    Publication Year: 2010, Page(s):V7-46 - V7-51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Network Anomaly Detection covers wide area of research. Current best practices for identifying and diagnosing traffic anomalies consist of visualizing traffic from different perspectives and identifying anomalies from prior experience. Different tools have been developed to automatically generate alerts to failures, but to automate the anomaly identification process remains a challenge. Recently, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on mine MES system based on ArchestrA architecture

    Publication Year: 2010, Page(s):V7-52 - V7-56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    Aimed at “isolated information resources” problem Chinese mine enterprises meet in production automation construction process, this paper puts forward a platform solving strategy. It establishes a mine MES system by ArchestA architecture design method, mainly studies the integrated automation system in mine production process, analyzes its structure and functions and discusses how to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The determinants of knowledge inflows from overseas Subsidiaries to MNCs' subsidiaries in China

    Publication Year: 2010, Page(s):V7-57 - V7-61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of moving object detection in intelligent video surveillance system

    Publication Year: 2010, Page(s):V7-62 - V7-66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    With the “green”projects such as the construction of China's gradual penetration into the network video monitoring system in the maintenance of social security, the fight against crime, an increasingly prominent role. Faced with a deluge of live and recorded video content, relying solely on manual observation and to distinguish between the traditional monitoring methods can no longer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A routing optimization algorithm in city logistics distribution

    Publication Year: 2010, Page(s):V7-67 - V7-70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of intrusion detection system using immune mechanism

    Publication Year: 2010, Page(s):V7-71 - V7-74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Intrusion detection system plays important role in guarantee the security of network. A whole intrusion detection system based on immune mechanism is put forward and established in this article on the basis of deeply analyzing the research situation of current intrusion detection technology. This system makes use of many advantages of natural immune mechanism such as multi-tier diversity uniquenes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of intelligence embedded Linux surveillance system based on TCP/IP

    Publication Year: 2010, Page(s):V7-75 - V7-77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    With the development of embedded technology, developing low-cost and high reliable embedded control system has become increasingly popular. Based on this thinking, our design is based on ARM9 platform using USB camera to get pictures and video streaming so as to monitor the system. And widely used in anti-theft alarm system, video door phone, etc., since low cost and high performance advantages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive image segmentation method using region growing

    Publication Year: 2010, Page(s):V7-78 - V7-80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Image segmentation is a basic image processing technology, the key step for further image processing and image analysis, but always a classical difficult problem. Facing the application of image segmentation technology, an improved adaptive watershed image segmentation is put forward in the form of system in this paper and modularized into three phase: adaptive filtering denoising, adaptive layeri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on routing method on peer-to-peer network

    Publication Year: 2010, Page(s):V7-81 - V7-84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    At present, the Internet model of the system is taking place from a traditional client / server (client / server) mode to right-Peer Computing (peer-to-peer, also referred to as P2P) mode to transmit. The core idea of P2P is that all participating nodes in the system (referring to a computer on the Internet) is completely equal status, there is no distinction client and server, it can be said that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud computing model based on MPI and OpenMP

    Publication Year: 2010, Page(s):V7-85 - V7-87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    According to the features of Message Passing Interface (MPI) and OpenMP, the cloud computing application methods based on MPI and OpenMP, including the MPI and OpenMP cloud computing algorithm design model, cloud computing principles, the core model, and the process are proposed. The distributed characteristic and parallel characteristic are introduced. Theoretical analysis results show this algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion on E-commerce key technology

    Publication Year: 2010, Page(s):V7-88 - V7-91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In China, with the broad popularity and gradual in-depth of e-commerce applications, more and more people have a clear understanding of the e-commerce value. The process of e-commerce industry is also in full swing, and with the market segmentation and the professional, industry-oriented needs of enterprises to the e-commerce services, the industry e-commerce has gradually become the mainstream of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech compression using LPC and wavelet

    Publication Year: 2010, Page(s):V7-92 - V7-99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    The past decade has witnessed substantial progress towards the application of low-rate speech coders to civilian and military communications as well as computer-related voice applications. Central to this progress has been the development of new speech coders capable of producing high-quality speech at low data rates. Most of these coders incorporate mechanisms to represent the spectral properties... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.