By Topic

Information Technology and Computer Science (ITCS), 2010 Second International Conference on

Date 24-25 July 2010

Filter Results

Displaying Results 1 - 25 of 152
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (436 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (377 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Research of Similarity Measurements in the Clustering Analysis

    Publication Year: 2010, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Similarity measurements play an important role in the clustering analysis, so any good or bad methods of measuring similar degree directly affect the clustering algorithm. In the paper, several approaches to similarity measurements for single attribute type data, which had been proposed, have been discussed. Moreover, a way has been obtained so as to calculate the similar degree of multiple attrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Protein Secondary Structure Prediction System Based on Compound Pyramid Model

    Publication Year: 2010, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Protein Secondary structure prediction is essential for the tertiary structure modeling, and it is the one of the major challenge of bioinformatics. In this article, we proposed a gradually enhanced, multi-layered prediction systematic model, Compound Pyramid Model (CPM). This model is composed of four independent coordination's layers by intelligent interfaces, synthesizes several methods, such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Median Filter Method for Image Noise Variance Estimation

    Publication Year: 2010, Page(s):13 - 16
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Image noise estimation is of crucial importance for the computer vision algorithm, for the algorithm parameter is always adjusted to account for the variations in noise level over the captured images. A median filter method is provided for the image noise variance estimation in the paper. The image was first processed with a group of high pass digital filters constructed by several finite differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Routing Algorithm of P2P Network Based on Asymmetric Nested Encryption

    Publication Year: 2010, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Correct routing is a key factor to maintain the stability and efficiency of P2P network. There are many types of attacks aiming at P2P routing, which seriously threats the security of P2P network. We proposed an improved routing algorithm based on asymmetric nested encryption detection. The algorithm can periodically inspect every node in routing path, and eliminate bad nodes and instable nodes in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pairwise Key Management Scheme Using Sub Key Pool for Wireless Sensor Networks

    Publication Year: 2010, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Correction of Errors from Segmented Digital Ink Texts in Chinese Based on Context

    Publication Year: 2010, Page(s):25 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1333 KB) | HTML iconHTML

    Digital ink texts in Chinese can neither be converted into users' desired layouts nor be recognized until their characters, lines, and paragraphs are correctly extracted. There are many errors in automatically segmented digital ink texts in Chinese because they are free forms and mixed with other languages, as well as their Chinese characters have small gaps and complex structures. Paragraphs, lin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Summarizing Similar Questions for Chinese Community Question Answering Portals

    Publication Year: 2010, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    As online community question answering (cQA) portals like Yahoo! Answers and Baidu Zhidao have attracted over hundreds of millions of questions, how to utilize these questions and accordant answers becomes increasingly important for cQA websites. Prior approaches focus on using information retrieval techniques to provide a ranked list of questions based on their similarities to the query. Due to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Content Extraction based on Webpage Layout Analysis

    Publication Year: 2010, Page(s):40 - 43
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    For web content extraction task, researchers have proposed many different methods, such as wrapper-based method, DOM tree rule-based method, machine learning-based method and so on. To some extent, all these methods ignore the layout information of the webpage, although the layout information such as the spatial and visual cues often plays a very important role in the process of locating the main ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimized Multi-class Classification Algorithm Based on SVM Decision Tree

    Publication Year: 2010, Page(s):44 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    An optimized multi-class classification algorithm based on SVM decision tree (SVMDT) is proposed. But by SVMDT, the generalization ability depends on the tree structure. In this paper, the relativity separability measure between classes is defined based on the distribution of the training samples to improve the generalization ability of SVMDT. SVM is extended to non-linear SVM by using kernel func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Localization Algorithm for Wireless Sensor Network Using Two-hop Beacon Nodes

    Publication Year: 2010, Page(s):48 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    The location estimation of sensor nodes is a fundamental and essential issue for wireless sensor networks (WSNs), because the gathered data is meaningful only when the location information of the sensor nodes is known. In this paper, we proposed a novel localization algorithm. In the proposed scheme, we first estimate the location of sensor nodes using Convex Position Estimation (CPE), and then re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chinese Sign Language Animation System on Mobile Devices

    Publication Year: 2010, Page(s):52 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Sign language is communication tool among the deaf. With popularation of computer, internet and other electronic device, sign language expressed as 3D animation is more effective to improve the exchange and access information for the deaf. In recent years, PDA, mobile phones and other mobile device's users increase rapidly, which makes 3D animation on the mobile devices become a research hotspot. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Balanced Scheme Based Unequal Density of Backbone for Wireless Sensor Networks Under Coal Mine

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    In order to solve uneven data throughput phenomenon for wireless sensor networks under coal mine, which cause “hot spots” problem, energy-efficient uneven clustering scheme based on the energy and distribution density of cluster heads ( UCS-ED ) is proposed, which formed by many existing routing protocols used in wireless sensor networks. In the cluster heads election phase it put th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Higher Order Spectra Analysis of EEG Signals in Emotional Stress States

    Publication Year: 2010, Page(s):60 - 63
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper proposes an emotional stress recognition system with EEG signals using higher order spectra (HOS). A visual induction based acquisition protocol is designed for recording the EEG signals in five channels (FP1, FP2, T3, T4 and Pz) under two emotional stress states of participants, Calm neutral and Negatively exited. After pre-processing the signals, higher order spectra are employed to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Texture Analysis Using GMRF Model for Image Segmentation on Spectral Clustering

    Publication Year: 2010, Page(s):64 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Spectral clustering algorithms are newly developing technique in recent years. In this paper, we derive a new pairwise affinity function for spectral clustering based on a measure of texture features represented by Gaussian Markov Random Field (GMRF) model. This model is used to capture the statistical properties of the neighborhood at a pixel, and then pairwise affinities represented by it can cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Carving Method for RAR File Based on Content and Structure

    Publication Year: 2010, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    File carving is a digital forensic technique. It aims to reconstitute a file from unstructured data sources with no knowledge of the file system. This paper presents an automatically carving method for RAR files. Since RAR is one of the most popular archive formats, and it is widely used on the digital devices to package data for transport or storage. It is important for forensic investigation to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quick Recognition and Relative Minimum Distances Filtering Assisted Recognition Based on Noisy-robust Rough Set

    Publication Year: 2010, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    With the development of rough set theory and it's strengths and weaknesses in the recognition field, the rule and recognition fusing method of noisy-robust rough set (NRRS) are proposed based on full normalized deposal, the non-uniform companding and simple dynamic clustering coding. The robustness of NRRS is improved by weighted reliability during training and recognition to dispose the accidenta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.