By Topic

Computer Science and Education (ICCSE), 2010 5th International Conference on

Date 24-27 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 449
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1076 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s):1 - ii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Keynote address I: Human rescue in disaster situations using multi-robot cooperation

    Publication Year: 2010, Page(s):vi - ix
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB)

    Summary form only given. An integrated intelligent approach may be used for the coordinated operation and control of a multi-robot system. The talk will present a cooperative multi-robot system for providing emergency services such as clearance, cleanup and human rescue in a disaster situation in an urban environment. In this application it is assumed that the available robots are heterogeneous wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on recommender system

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of technical programs

    Publication Year: 2010, Page(s):xii - xxxii
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • Automatic identification of noun phrases based on statistics and rules

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    By analyzing the characteristics of Chinese noun phrase, propose an automatic identification method of Chinese noun phrase based on statistics and rules. The method includes efficient binary statistical model, mutual information, and rules for knowledge established from a large number of corpus. Then we analyze the distribution of noun phrase in detail. The results show that the method is fit for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach of Random Forest for multiclass classification problem

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Investigate the potential of Random Forests in a multiclass setting and propose a new algorithm based on error-correct-coding (ECC) and loop-symmetrical division. It performs significantly better than the original RF and slightly better than the other two approach that usually used to handle multiclass problem. But our algorithm has lower computation cost which is very important especially in larg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating human eyes in face images based on illumination normalization and progressive thresholding

    Publication Year: 2010, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is used to realize normalizing of the face image. Secondly, a determination criterion of eye location is established by the priori knowledge of geometrical facial features. Thirdly, a r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scene image classfying via the Partially Connected Neural Network

    Publication Year: 2010, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    This paper presented a new method for scene images classification via Partially Connected Neural Network. The neural network has a mesh structure in which each neuron maintain a fixed number of connections with other neurons. In training, the evolutionary computation method was used to optimize the connection target neurons and its connection weights. The model is able to receive a large number of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A brief review on Item Response Theory models-based parameter estimation methods

    Publication Year: 2010, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    Item Response Theory (IRT) is a psychological and educational measurement theory which breaks the limitations of Classical Test Theory (CTT). The core issue of IRT application is parameter estimation. Taking the Logistic model as an example, this article introduces the basic models and parameter estimation methods of IRT, especially the IRT parameter estimation algorithms based on artificial intel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision table decomposition using core attributes partition for attribute reduction

    Publication Year: 2010, Page(s):23 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB) | HTML iconHTML

    The attribute reduction algorithms of decision table based on discernability matrix are required to construct discernability matrix, which reduces efficiency of algorithms. In this paper, a decision table decomposition model is proposed to solve the attribute reduction problem based on discernibility matrix for large decision table. By introducing the core attributes partition, the large decision ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute weighted Naive Bayesian classification algorithm

    Publication Year: 2010, Page(s):27 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB) | HTML iconHTML

    Naive Bayes algorithm is a simple and efficient classification algorithm, but its conditional independence assumption is not always true in real life which is affected to some extent. Weighted Naive Bayesian classifier relax the conditional independence assumption to increase accuracy. Based on Identifiably matrix of Rough Set, a new weighted naive Bayes method based on attribute frequency is prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method for SF6 gas leakage detection

    Publication Year: 2010, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    For the defect of manual detection of Sulfur hexafluoride(SF6) gas leakage in laser imaging video, this paper proposes an efficient and automatic gas leakage detection method. Firstly, global motion estimation and compensation are performed in laser imaging video, secondly, accumulative frame-difference and an improved high-order statistics(HOS) algorithm are used to detect leakage area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an embedded control and acquisition system for industrial Local Area Networks based on ARM

    Publication Year: 2010, Page(s):35 - 39
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    The design and development of an embedded control and data acquisition system is presented. The system is an intelligent remote unit featuring embedded technology for data acquisition, monitoring and output control. Using a high integrated 32-bit RISC microprocessor as well as serial A/D and D/A converters, the electronic systems are compact and the device has high performance. Besides stand-alone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of RCS characteristic of dihedral corner and triangular trihedral corner reflectors

    Publication Year: 2010, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Method of physical optics is used to simulate backetscattering cross section of dihedral corner and triangular trihedral corner, RCS characteristic of dihedral corner reflectors with a series of parameter changing is analyzed, such as the width, length and intersection angle etc. The reliability of RCS simulation for triangular trihedral corner in this study is verified. The main results and concl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of gas diffusion during sudden leakage on block-scale

    Publication Year: 2010, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Sudden leakage has become a growing threat to public safety in cities. In our study, constructing a model of three-dimensional dynamic diffusion of leaked pollution gas, and exploring key technologies for space-time evolution of leakage diffusion, we implemented the visual processing of positioning and monitoring of regional pollution and also implemented the visual presentations and interpretatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic analysis of regional land cover change based on TM images

    Publication Year: 2010, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Based on the RS and statistics methods, the objective of this study is to ascertain the spatial differences of urban land cover conversion of regional land cover with the Landsat TM images of the years 1988 and 2007. This paper illustrates the spatial expansion process of urban land cover with fractal model. The result shows: the land cover types changed greatly during 1988 to 2007; the area of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quasi-cubic Bezier curves by trigonometric polynomials

    Publication Year: 2010, Page(s):53 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    A class of quasi-cubic Bezier curves (briefly QC-Bezier curves) with two shape parameters is presented in this paper. The QC-Bezier curves retain the main superiority of cubic Bezier curves. Unlike the existing techniques based on C-Bezier methods which can approximate the Bezier curves only from single side, the QC-Bezier curves can approximate the Bezier curve from the both sides. The curves inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of single-carrier MIMO transmission with frequency domain equalization

    Publication Year: 2010, Page(s):56 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    A multiple-input multiple-output (MIMO) single-carrier frequency domain equalization (SC-FDE) testbed which can emulate a practical broadband system is described. A scheme combining space-time transmit diversity with SC-FDE was implemented and evaluated on the testbed. After the hardware configuration, software algorithms incorporating the space-time block coding and decoding, synchronization, cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of variable-length block encryption algorithm based on Chaos Particle Swarm

    Publication Year: 2010, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    In this paper, a Chaos Particle Swarm (CPS) algorithm is proposed which fuses sensitivity to initial value, randomness and ergodicity of chaos into conventional particle swarm. Chaotic discrete mapping uses CPS to carry out variable-length block encryption to enhance complexity and unpredictability of cipher text. Experiments illustrated that it is difficult to decrypt cipher text in this algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic location of facial acupuncture-point based on content of infrared thermal image

    Publication Year: 2010, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Automatic location of acupuncture-point is an available way to the characterization of Chinese Medicine. In this paper, the content of infrared thermal image is investigated to mine the automatic location of facial acupuncture-point by the image processing technology. Since user's work is not involved in the location of acupuncture-point, the characterization of facial diagnosis can be greatly imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Target tracking using quantized innovations in wireless sensor networks

    Publication Year: 2010, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Local data quantization/compression is a necessity due to the bandwidth constraint of wireless sensor networks. A target tracking method that uses quantized innovations is proposed for wireless sensor networks. The posterior Cramer-Rao lower bound (PCRLB) for quantized innovations is derived. The simulation results show that the proposed method can reach the PCRLB even with the high level process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.