By Topic

Information Engineering and Electronic Commerce (IEEC), 2010 2nd International Symposium on

Date 23-25 July 2010

Filter Results

Displaying Results 1 - 25 of 123
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Message from Symposium Chair

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • The Research of Non-Uniform Node Distribution in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    In large scale deployment of wireless sensor networks, nodes transmitted sensed data through multi-hop to Sink, The area near the Sink forms energy hole due to heavy load. Non-uniform node distribution can effectively solve the problem of energy hole; this paper theoretically analyzes the network energy consumption and presents a method of node distribution, according to the method a kernel-based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Handwritten Chinese Characters Segmentation Algorithm Based on Active Contour Model

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    The classical C-V algorithm has the shortage about multi-iterative operations and the computational time is too long to segment the large size image. On the base of analysis upon the relationship between the image size and the number of iterations and time to get the right result, the article proposes a fast image segmentation algorithm based on local C-V active contour model which are based on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Analysis and Compilation of Grid Maintenance Scheduling Based on Graphic Operation

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    Intelligent analysis and compilation of grid maintenance scheduling under new circumstances are discussed. Based on graphic operation, the normative maintenance data can be searched and obtained from the equipment mapping library which is one-to-one correspondence with each equipment graphic element in the designed graphic operation platform, and the whole process uses the maintenance data type se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Immune Genetic Algorithm Based on Niche Algorithm and Its Application

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    In order to overcome traditional genetic algorithm (GA)'s deficiency of slow convergence, and Niche algorithm's too fast convergence, this paper presents a new Improved Immune Genetic Algorithm (IIGA) based on the improved Niche algorithm. Firstly, the improved Niche algorithm, including convergence function, and "noise" chromosome, is given. Then based on the proposed flowchart of IIGA, the steps... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replica Placement Algorithms in Content Distribution Networks

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB) | HTML iconHTML

    The replica placement problems (RPPs) in the Content Distribution Networks have been widely studied. In this paper, we propose an optimization model for the RPPs and design efficient algorithms to minimize the total cost of the network. The algorithms include three parts: replication algorithm preprocess, constraint p-median model and algorithm of solving constraint p-median models. In the simulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Operation Optimization of Gas Pipelines Based on Adaptive Genetic Algorithm

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    A variety of processes are utilized for gas transmission. It is important to optimize the operation conditions of these processes to promote efficiency. The operation efficiency of pipeline systems is combined with the purchase and sale prices of gas, the quantity bought and sold of gas and the management costs. Aimed at the maximum operation efficiency, an operation optimization model of gas pipe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Simulation Technology of Coal Bed Methane Transmission Pipeline

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    In view of the characteristics of coal bed methane, equation of state BWRS is used to calculate the thermodynamic parameters. Then based on continuity equation, momentum equation, characteristic equations of non-pipe elements and flow quantity balance equation, the simulation mathematic model of coal bed methane transmission pipeline is built. Considering the slow transient characteristic of gas f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of Shutdown and Restarting Process of Heated Oil Pipelines

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    During the operation process of heated oil transportation pipelines, shutdown accidents may be caused by some faults. In view of hydraulic and thermodynamic characteristics, the transient simulation model of heated oil pipelines is established based on hydrodynamic theories. The model is composed of quasilinear hyperbolic partial differential equations. Integration with the boundary conditions tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Eye Localization on Multi-View Face in Complex Background Based on SVM Algorithm

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    Focused on multi-view eye localization in complex background, a new detection method based improved SVM is proposed. First, the face is located by AdaBoost detector and the eye searching range on the face is determined. Then, the crossing detection method, which uses the feature of eye and brow integrated as a whole, and the improved SVM detectors trained by large scale multi-view eye examples are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on Optimal Operation of Hydropower Station Based on Cultural Particle Swarm Optimization Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    Hydropower station optimal operation is a complex nonlinear combinatorial optimization problem. A novel culture particle swarm optimization algorithm for optimal operation problem in hydropower station is suggested. A local random search operator to achieve knowledge structure in belief space and enhance the population diversity and increase the capacity of global search with the introduction of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Model and Algorithm for Simulation of Smoke-dust in Nuclear Facilities Decommissioning Virtual Simulation

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In this research, the corresponding mathematic model was established firstly, thereafter, a splitting-approach was applied to achieve the component equations. In the process of solving equations, a semi-Lagrangian method was used to solve both transient and convection terms, and to solve the pressure equation for incompressible fluid the bound-based projection algorithm was adopt. This study only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Level Set Segmentation Method Based on the Overall Information of Image

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Considering the characteristic that the nucleus and the nucleolus have no obvious boundary, this paper presents a fast level set method which is based on the overall information of an image to extract the nucleolus from the prostate nucleus. We pre-process the three-dimensional colorful prostate image at first, making the nucleolus (target) distinct to the surrounding environment (background) at t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering Ensemble Based on a New Consensus Function with Hamming Distance

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Unlike classification problems, there are no well known approaches to combining multiple clusterings which is more difficult than designing classifier ensembles since cluster labels are unknown. A new algorithm is to use Hamming distance as the similarity metric to find the best partition is proposed. Also a scheme for a selective initial cluster centers by Hamming distance is used in the consensu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Large-Scale Data Classifying Approach Based on GP

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    The method that the utility of genetic programming (GP) is used to create and use ensembles in data mining is demonstrated in the paper . Given its representational power in the model of complex non-linearities in the data, GP is seen to be effective at learning diverse patterns in the data. With different models capturing varied data relationships, GP models are ideally suited for combination in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HMAC-Based RFID Authentication Protocol

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    Radio Frequency Identification (RFID) is a non-contact automatic identification technology, and has many applications, such as in logistics, transportation, retail, etc. The wireless communication channel of the RFID systems is vulnerable to various malicious attacks, and RFID tag has limited calculation resources and small storage capacity, aimed at these problems, a HMAC-based RFID lightweight a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weak Signal Detection Study Based on Duffing Chaos Circuit Used for Downhole Communication

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Weak signal detection is very important in the downhole acoustic telemetry system. This paper introduces the Duffing oscillator weak signal detection method for the downhole acoustic telemetry systems. First, by solving the Duffing equation, analyzed the dynamics characteristic of Duffing oscillator and weak signal detection principle; and then on this basis, built Duffing oscillator circuit based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Object-Oriented Rete Algorithm and Network Structure Model

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    In order to solve the implementation efficiency problem of the network information system security policy, an improved object-oriented Rete algorithm and network structure model are proposed. The control methods of the nodes and tokens in the matching algorithm with the pattern join order are studied, that core idea is to use the separate matches to construct matching tree dynamically based on con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Privacy Preserving Data in Web Log Mining

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Researches on preserving private data in the application of web data mining possess practical value. Through introducing basic concepts of web log mining and private data protection, this paper analyzes the status quo of privacy preservation in web log mining, and then it puts forward privacy preserving mining model based on evolutionary algorithm of cloud model, combining with evolutionary algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.