By Topic

Uncertainty Reasoning and Knowledge Engineering (URKE), 2011 International Conference on

Date 4-7 Aug. 2011

Go

Filter Results

Displaying Results 1 - 25 of 74
  • [Front and back cover]

    Publication Year: 2011, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • URKE 2011: Table of contents: Volume — 2

    Publication Year: 2011, Page(s):i - v
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s):vii - x
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Freely Available from IEEE
  • Study on data stream prediction based on least square support vector machine

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Recently, data stream prediction has become a new hotspot in the field of data processing. Support vector machine is a new forecasting method. It can better solve the small sample, nonlinear, high dimension and local minimum points and other practical problems. In the paper, Sliding window processing mode and incremental online least square support vector machine(LS-SVM) algorithm was introduced t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital watermark for document electronic seal system based on DCT technology

    Publication Year: 2011, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    According to the characteristics of the electronic seal and the special security requirement, a watermarking scheme for electronic seal based on the discrete cosine transform is proposed. The theory of digital watermark based on DWT for electronic seal is discussed. In the process of embedding the watermark image is processed by Arnold transformation and the original image is divided into some blo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental research of image digital watermark based on DWT technology

    Publication Year: 2011, Page(s):9 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    In view of the safety and genuineness protection of the image while traveling over the internet, a novel digital watermarking scheme based on discrete wavelet transform (DWT) is proposed. The theory of digital watermark based on DWT for electronic seal is discussed. The digital watermark is scrambled with logistic chaotic sequences to improve the security of the system. Then the watermark signals ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The scientific and technological secrecy management of military enterprise based on the dynamical theory of tacit knowledge transition

    Publication Year: 2011, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    Tacit knowledge is the foundation and source of enterprise core competitive edge, also is an important content of scientific and technological secrecy management on national defense and military enterprise. From the view point of the whole tacit knowledge transition system, we set up the nonlinear dynamic model of tacit knowledge transition on the employees of national defense and military enterpr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and implementation of digital rights management model for vector graphics

    Publication Year: 2011, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    Vector graphics is an important form of multimedia information. Compared to the focus on digital rights management for e-books, streaming media, research on copyright protection for vector graphics is relatively less. This paper first describes the basic principles of digital rights management, and then presents a copyright protection model for vector graphics based on the copyright protection nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plants virtual reality simulation based on IFS arithmetic

    Publication Year: 2011, Page(s):21 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Dynamic, randomicity, and scrambling make it complex to simulate plants in the computer fused remote sensing information, radiometer data, and multi-sensor data. It requires the arithmetic a better simulation data entry, and ensures actual, stable and real time export. Based on IFS arithmetic, it can be realized plants simulation effectively. The paper discusses the key steps such as S cushion aff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speckle images denoising in laser projection displaying

    Publication Year: 2011, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In the paper, we achieved the speckle image statistics restoration by computing the most likely state at each pixel based on hidden Markov models (HMM). Among the features of the proposed method, HMM takes the adaptive window size which allows us to obtain a better estimate of the local variance of the noise for different regions of the image. Therefore, the additive noise is removed more in the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the irregular body expanded and lay-out optimization

    Publication Year: 2011, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    The main body of the article is used for Inventor developing platform, is repeated exploitation implement with VB, set forth the realization method providing the scheme unfolding flat surface montage and optimization. The method includes the establishment of solid models structure tree, the expandedness of space surface, the continuity of the scheme unfolding flat surface and the method of lay-out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual analysis on the research of cross-language information retrieval

    Publication Year: 2011, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The authors use the information visualization software - CiteSpace II to conduct the knowledge mapping based on the data of cross-language information retrieval(CLIR) downloaded from the Web of Science at Institute for Scientific Information (ISI), including SCI, SSCI, and A&HCI. The paper maps the co-citation network mapping to reveal the representative scientists and documents of CLIR. Then ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking e-commerce users: The role of software agents

    Publication Year: 2011, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB) | HTML iconHTML

    This paper attempts to answer three questions in terms of users with software agents. In the e-commerce field, users have online access to products and services. Such users could assign their routine and problematic transactions to agents that will be acting under their permission. Why, how, and when this activity occurs is well exhibited in this paper. Agents are participating in e-commerce due t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study and implementation of automatic fingerprint recognition technology

    Publication Year: 2011, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    Automatic identification technology becomes a urgent need of production and life, authentication technology gained worldwide attention because of its high reliability, fingerprint identification technology which applied to social security system can accurately determine protects a person's identity and prevent the phenomenon of the pension of falsely claim that solves this one long-term puzzling p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of embedded FAT file system

    Publication Year: 2011, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    Recently, with the rapid development of embedded systems, embedded operating system has also been more widely used, The demand of supporting file system in embedded product is also increased greatly. Such as mobile music, image storage, etc., and now the hard disk can be recorded TV there, all of which need to have embedded file system support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The desgin of embedded SQLite3 and application of Commodity Rapid Positioning System based on Wi-Fi technology

    Publication Year: 2011, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    With development of embedded database technology, network performance of mobile-device and standardization of data management have a significant change. For characteristics of high reliability and real-time that Wi-Fi Commodity Rapid Positioning System terminal has, embedded database SQLite3 is proposed to manage system bulk data like storing, operating maintaining. Combined with enterprise requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of storing technology about w5100

    Publication Year: 2011, Page(s):52 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    The chip w5100 that bases on Ethernet controller designes a device using single-chip that directly control w5100 data transmission and storage. Based on the analysis of the w5100 working principle, this paper emphatically expounds the hardware circuit design scheme and the software development process. Results shows that the device has the characteristics, high reliability of the data transmission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VCRs control system based on LANC bus protocol

    Publication Year: 2011, Page(s):55 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    With the development of economy and the improvement of science and technology, the digital camera is applied more and more widely. Most cameras also come with LANC remote control interfaces. This paper describes a LANC-based camera control system. In this system, the STC12c2052AD microcontroller communicates with the SONY digital camera by the I/O pin. Through the PC serial communication with the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research of collaborative filtering recommendation based on ant colony algorithm

    Publication Year: 2011, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Imitated ant foraging theory, users are regarded as different attributes ants, clustering centers are regarded as the “food source” that ants search, proposed to realize user clustering based on ant algorithm for improving the query speed of nearest neighbors in the collaborative filtering recommendation system, reducing the cost of the search, and avoiding the effect of initial clus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis of interaction between monetary market and capital market

    Publication Year: 2011, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    As two sub-markets of financial market, money market and capital market both focus on currency and provide sites and channels for all financial assets and currencies to communicate with each other. Thus, capital markets and currency markets have a strong linkage. Only by strengthening the linkages between the two and guarantee their mutual development, can we improve the efficiency of the whole fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-commerce and its implication for managing

    Publication Year: 2011, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (78 KB) | HTML iconHTML

    This paper intends to define e-commerce and examine major components that associate organizational systems with web technology. The application of EC in manufacturing, retailing and service operations is well discussed. We summarize our findings and conclusions in the end. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The comprehensive benefits evaluation in application of the regenerative concrete hollow block — Which is based on the fuzzy comprehensive evaluation method of entropy

    Publication Year: 2011, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    The regenerative concrete hollow block is some kind of new building material, which is in line with cyclic economy and Low carbon economy. This article has evaluated the comprehensive benefits in application of the regenerative concrete hollow block by introducing the fuzzy comprehensive evaluation method to construct a comprehensive evaluation model. As the result, it requires related policies an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Electronic Bidding System based on AI and J2EE

    Publication Year: 2011, Page(s):74 - 77
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Electronic Bidding System (EBS) is a hotspot in academic field. Studied EBS and its development, analyzed the necessity for researching on EBS, an integrated EBS based on AI and J2EE is proposed. Finally, the plan to design and implement the system is expounded. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer value evaluation model of vocational college student custom

    Publication Year: 2011, Page(s):78 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    In an increasingly competitive education market, vocational college need enhance competitive power based on customer value. In order to provide theoretical guidance for enhancing vocational college competitiveness, the paper studies customer value (CV) in vocational colleges from the view of student custom. Firstly, the paper proposes theory model of customer value evaluation system. Secondly, emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.