By Topic

Information Processing (ISIP), 2010 Third International Symposium on

Date 15-17 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 148
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1487 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Message from the Symposium Chairs

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2010, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xix - xxi
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Study on the Example Validation for the Linear Approximation Optimization Method

    Publication Year: 2010, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    The successive linearization optimization, incision plane, little-step grads and two-rank linearization solution method was introduced. For a problem with two-rank objective function and constraint function, three times of solving linearization problem achieves the optimization point nearly same as extremum point by successive linearization optimization. The method has the characteristic of gradua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Measuring Approach of Portfolio's VaR Based on APGARCH-EWMA Model

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    Value at Risk (VaR) is a commonly statistical tool to measure market risk. In this paper, a mixture method of APGARCH-M model and EWMA algorithm is applied to measure VaR of a portfolio. Empirical study using three stock index of shanghai stock market shows the mixture method is advantageous and accurate to calculate VaR of a portfolio. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method of License Plate Location Based on Multi-threshold Quantization Segmentation of Color Image

    Publication Year: 2010, Page(s):9 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    In the complex reality environment, License plate image may contain multiple plates. At this point, simply using grayscale or color image processing only is very difficult to achieve fast and accurate positioning. By full use of the multiple conditions such as color, edge features and veins, a new method of multi-objective, integrated color of license plate location has been put forward. Firstly, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Risk Assessment of Power Network Planning Projects Based on G1 Method and F-DS Evidential Theory

    Publication Year: 2010, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Considering the problem that it is difficult to quantify the uncertainty problem about risk assessment of power network planning projects, G1 method and F-DS evidential theory are adopted to establish the assessment model of power network planning projects. Put forward the weighted formula of evidence combination with the use of G1 method. Apply information fusion technology of F-DS evidential the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Enterprise Human Resource Evaluation Research Based on Neural Network

    Publication Year: 2010, Page(s):19 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In order to satisfy the needs of human resources management and development, this study took R&D professionals as the research object and proposed an evaluation model for high-tech enterprise human resources based on artificial neural network, then trained and tested the neutral network for personnel evaluation. And the network was improved to be very effective to stimulate the evaluation of h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Robot Network Communication System in Underground Coal Mine Based on ZigBee

    Publication Year: 2010, Page(s):22 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    ZigBee/IEEE 802.15.4 was created to address the market need for a cost-effective, low complexity wireless networking solution that supports low data-rates, low-power consumption in application of short range. In our design, the industry-leading CC2420 from Texas Instruments (TI) is the key single-chip RF transceiver compliant with ZigBee/IEEE 802.15.4. By modifying and trimming the ZigBee stack, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Congestion Control in Wireless Video Transmission

    Publication Year: 2010, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    With the development of the wireless communications technology and the multimedia technology, the wireless internet multimedia transport of real-time becomes an important applications field. We will meet a problem that the distinguish of the status of package loss is not very good which will affect the QoS when we transport multimedia data in wireless internet. Based on this problem the article co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reinforced Approach for Enhancing Stochastic Search

    Publication Year: 2010, Page(s):29 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Stochastic search algorithms are often robust, scalable problem solvers. In this paper, we carefully study the Iterative Sampling(IS), Heuristic-Biased Stochastic Sampling(HBSS) and Value-Biased Stochastic Sampling(VBSS) algorithm, and present an approach for enhancing such multi-start algorithms. This paper shows that given some heuristic information about the search start point, these algorithms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Force Control Algorithm of Parallel System

    Publication Year: 2010, Page(s):32 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    A new force control algorithm was proposed for parallel system. Through the analysis of the kinematics theory of multi-axis motion controller, a force control algorithm was put forward based on kinematics. Then a procedure of 2D parallel system as example was given. The result shows it is easy to realize and modify. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Prediction Approach of Transmembrane Helical Segments in Membrane Proteins Based on Wavelet Transform

    Publication Year: 2010, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    The increasing protein sequences from the genome project require theoretical methods to predict transmembrane helical segments (TMHs). In this paper, a method based on discrete wavelet transform (DWT) has been developed to predict the number and location of TMHs in membrane proteins. PDB coded as 1F88 is chosen as an example to describe the prediction process with this method. One group of test da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS Routing Scheme for Wireless Multimedia Networks Based on UWB

    Publication Year: 2010, Page(s):39 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Ultra-Wide Band (UWB) wireless communication is a promising spread-spectrum technology with features of low cost, low power and high time resolution has potentially important applications in wireless ad hoc networks. This paper presents a novel quality of service (QoS) routing scheme for wireless multimedia ad hoc networks. Besides applying neighbor detection method in route discovery procedure, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Semi-supervised Cluster Algorithm for Anomaly Detection

    Publication Year: 2010, Page(s):43 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Most current anomaly detection systems employ supervised methods or unsupervised methods. Supervised methods rely on labeled training data, however, in practice, this training data is typically expensive to produce. In contrast, unsupervised method can work without the need for massive sets of pre-labeled training data, but its accuracy is quite low. This paper put forward a semi-supervised cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Multiple Instances Schedule Based on Object Pool

    Publication Year: 2010, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Multiple instances of activity makes workflow management more flexible on handling process, but it causes some problems, such as synchronizing schedule and data sharing confliction. This paper proposes a scheme mode of object pool with lock. In the mode, object pool is constructed for each activity, all instances of the activity are deposited in respective pool, and the schedule scheme is implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RET: A Random and Encounter Time Based Forwarding Mechanism for Opportunistic Network

    Publication Year: 2010, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Based on the analysis of the existing utility-based forwarding mechanisms, for the inefficient forwarding of history encounter time based forwarding mechanism in the initial phase of the node movement, a Random and Encounter Time Based algorithm named RET is proposed in this paper. RET divides the nodes moving into two phases-random forwarding phase (initial phase) and utility-based forwarding pha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SANATOMY: Privacy Preserving Publishing of Data Streams via Anatomy

    Publication Year: 2010, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Compared with generalization, anatomy preserves both the privacy and the correlation in data publication. On the other hand, data streams have gradually become a widely used data representation. Therefore, in this paper, we develop a novel algorithm of SANATOMY, to solve the problem of anatomized publishing of data streams. It creates l-diverse buckets according to the stream tuples' sensitive val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processing Online Market Information Based on Users' Online Information Behavior

    Publication Year: 2010, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Market information management has always been an essential component of good marketing management practice, but only possession of market information is not sufficient. Recently, processing market information has been of increasing interest to organization researchers, they suggested that improving the market information processing capabilities is important for marketing managers to understand and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.