By Topic

Information Engineering and Computer Science (ICIECS), 2010 2nd International Conference on

Date 25-26 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 490
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 28
    Request permission for commercial reuse | PDF file iconPDF (474 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • 3D Feature Points Reconstruction Based on Stereo Vision of UAV

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    In this paper, we build the stereo vision system on a UAV named “Sky-walker” which was designed and created in Shanghai Jiaotong University. Used the image processing technique, we improved the feature points matching algorithm and made higher success rate. Then in the 3D reconstruction, we managed to reconstruction a large amount of 3D feature points, at last we tested the results d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D Finite Element Analysis on 480 Diesel Crankshaft

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    Finite element analysis has been used to investigate the vibration modal of 480 crankshaft and the stress analysis of crankpin. The aim of the modal analysis was to explain the relationship between the frequency and the vibration modal. And the aim of the stress analysis of crankpin was to find the maximum deformation and maximum stress point. In this paper, three-dimension models of 480 diesel en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chaotic Sequence Watermarking Algorithm for Infrared Image

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    A watermarking algorithm for the infrared image copyright protection was developed. The whole process was based on integer wavelet transform. Encrypt the grey scale image watermark by Logistic chaotic sequence, and then decompose based on integer wavelet. Select the perceptually significant wavelet coefficients, and then inosculate in the given position of the original image. The watermark was det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Color-Based Target Localization Method and Its Implementation on Embedded Auto-Mobile Robot System

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    In this paper, a target localization method based on color recognition and connected component analysis is presented. The raw image is converted to HSI color space through a lookup table, followed by a line-by-line scan to find all the connected domains. By checking the size of each domain, most pseudo targets can be omitted and, meanwhile, the target position would be calculated. Owing to the abs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Communication Model of Anycast in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Anycast is a mechanism that the source node sends the data groups to the nearest sink node. The paper proposes a communication model of implementing an Anycast service for deploying several sinks in wireless sensor network. We propose a novel anycast tree-based approach to reduce the mutual interference and minimize the energy consumption. Here the nodes as the anycast node form a tree with a sink... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A Comparative Study on Mobile Ad Hoc Wireless Network Routing Protocols Simulation

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (578 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Corner Matching Algorithm Based on Harris Operator

    Publication Year: 2010, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Image Matching is a fundamental tasks in image processing used to match two or more images, for example, at different time, from different viewpoints, Registration is the foundation of many image processing and applications such as object recognition, change detection, 3-D modeling. The paper researches Image Matching based on characteristic point, such as Harris Operator, and introduces corner po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CSP Approach for Customizing Mobile Service Bundles

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    To satisfy individual requirements of customers, mobile phone service industries are offering a variety of service modules for customers to build their own customized service packages. In this paper,we present an approach of customizing service bundles using CSP (Constraint Satisfaction Problem), a well-known problem-solving technology in AI domain. Firstly, service customization model containing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CUDA Based Implementation of an Image Authentication Algorithm

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1196 KB) | HTML iconHTML

    Image authentication is an important technology to protect images from being malicious tampered and have became an indispensable part of digital world. The main schemes used for image authentication are signature and watermarking in the last decade. However, in traditional serial manners, the operations of both methods are time-consuming, and limit the wide use of image authentication. In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DFT Solution for Multi-Supply Multi-Voltage System-on-Chip

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Design for testability (DFT) technology is an important part in system-on-chip (SoC) design and implementation. At present, design for testability can be realized by commercial electronic design automation tools. However, development of technology and need of market make the SoC must adopt the advanced low power solution, which presents challenges for DFT. Take a power gating and dynamic voltage s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Image Processing System Based on DSP

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    In order to detect the target position real-timely,a real time target detecting system based on tms320F2812 DSP and Spartan3-SC3S400 FPGA is designed.The design,hardware structure,a target detecting method and software char flow of FPGA and DSP are presented.The system is tested by a 1K×1K image,the processing time is 1.3ms, experiments results show that the method is feasible,the simple de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Slot Assignment Scheme for Wireless Ad Hoc Networks

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    A distributed dynamic slot assignment scheme for multi-channel Time Division Multiplex Access (TDMA) based wireless Ad Hoc networks is presented in this paper. As exclusive control channels are introduced, hidden terminals are enable to receive packet whereas transmit packets are avoided. Similarly, exposed terminals are enable to transmit packets while receive packets are avoid. Thus high efficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Ontology Construction Method Towards Healthy Housing

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Ontology construction can allow users or agents of software to arrive at consistent views about organization structure of information, even improve the reusability in the professional fields. However, because of the differences between domains, there is no existing technical route as the standard method for ontology construction at the present time. This paper offers an improved ontology construct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fixed-Complexity Sphere Decoder for MIMO Systems on Graphics Processing Units

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Graphic Processing Units (GPUs) is a low-cost parallel programmable co-processor that can deliver extremely high computation throughput and is well suited for large-scale system design and simulation. In this paper, we utilize the parallel processing power of GPU to accelerate the simulation of MIMO systems. In our work, flat fading channel is considered and an optimized fixed-complexity sphere de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Medical Information Integration Based on Ontology and Web Services

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    With the rapid development of computer technologies and medical industries, the sharing and exchanging of medical information has become increasingly important. A framework for integrating heterogeneous, diverse and various medical information systems based on Health Level 7(HL7), ontology and Web services is proposed in this paper. In the paper, we describe the framework architecture, module func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Service Discovery in Pervasive Computing

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Service is provided by a lot of autonomous, heterogeneous devices in pervasive computing environment. Service discovery by interface or key words is not fit for heterogeneity and autonomy of devices in pervasive computing environment. Thereby, service discovery by the way of semantics is a hotspot for research. This paper introduces the service description language, OWL-S, and then designs a proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy-Neural Network Sliding Mode Control for Flexible Spacecraft

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    A fuzzy-neural network sliding mode control (FNNSMC) is proposed for the attitude stabilization of flexible spacecraft during large angle slew maneuver. The dynamic model of the spacecraft with flexible appendages is derived by Lagrange equation. To make the system state reach sliding mode surface in finite time, a sliding mode controller is designed, so the system is robustness against uncertaint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.