By Topic

Internet Computing & Information Services (ICICIS), 2011 International Conference on

Date 17-18 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 172
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (4956 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (382 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (165 KB)  
    Freely Available from IEEE
  • Message from the ICICIS 2011 Chair

    Publication Year: 2011 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011 , Page(s): xvii - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Mining Frequent Embedded Subtree from Tree-Like Databases

    Publication Year: 2011 , Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    Mining frequent sub tree from databases of labeled trees is a new research field that has many practical applications in areas such as computer networks, Web mining, bioinformatics, XML document mining, etc. These applications share a requirement for the more expressive power of labeled trees to capture the complex relations among data entities. In this paper an efficient algorithm is introduced for mining frequent, ordered, embedded sub tree in tree-like databases. Using a new data structure called scope-list, which is a canonical representation of tree node, the algorithm first generates all candidate trees, then enumerates embedded, ordered trees, finally joins scope-list to compute frequency of embedded ordered trees. Experiments show the performance of the algorithm is about 15% better than other similar mining methods and has good scale-up properties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application on Integration Technology of Visualized Hierarchical Information

    Publication Year: 2011 , Page(s): 8 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB) |  | HTML iconHTML  

    As the grown of information inquiry and rapid development of information network, it has been seen that the traditional information technologies are no longer able to meet people's demands. The hyperbolic tree, on the other hand, is a newly introduced technology on hierarchical information visualization. We, after thoroughly investigated the principle of hyperbolic tree, transformed directory tree into hyperbolic tree by integrating the traditional tree with the hyperbolic tree to form a new type visualization method. This integrated technology shows great potentials and effects after applied into urban and regional planning system which consists of numerous data and information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion States Recognition System Based on Ultrasound for Automatic Door Management

    Publication Year: 2011 , Page(s): 11 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (446 KB) |  | HTML iconHTML  

    The paper describes a novel motion states recognition system based on ultrasound to make up for the shortcomings of existing motion states recognition systems. Characteristics of this system are shown as follows: The motion states of people beside the door can be identified quickly and exactly by motion states recognition algorithm based on Doppler effect, an innovative divisional detection algorithm has been brought forward to estimate the number of people who want to go across the automatic door, the ultrasonic sensor gives a good performance on anti-interference in addition to its low energy consumption and price. Therefore, using ultrasonic probes can improve the performance of the system while reducing the cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-based Reasoning Enabling Database Mining for Cryo-Preserving Algae Applications

    Publication Year: 2011 , Page(s): 16 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (346 KB) |  | HTML iconHTML  

    Case-based Reasoning's (CBR) origins were stimulated by a desire to understand how people remember information and are in turn reminded of information, and that subsequently it was recognized that people commonly solve problems by remembering how they solved similar problems in the past. Thus CBR became an appropriate way to find out the most suitable solution method for a new problem based on the old methods for the same or even similar problems. The research highlights how to use CBR to aid biologists in finding the best method to cryo preserve algae. The study found CBR could be used successfully to find the similarity percentage between the new algae and old cases in the case base. The prediction result showed approximately 93.75% accuracy, which proves the CBR system can offer appropriate recommendations for most situations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision Support System for Technical Management of Food Processing Industries

    Publication Year: 2011 , Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (527 KB) |  | HTML iconHTML  

    A computer-based decision support system called a Production Economical Reporting and Control System (PERCS) has been developed to help people work in food processing industries: decisions making, choosing between alternatives, solving problems and planning for the future. The system was divided into five parts: (a) the data management, (b) the model management system, (c) the knowledge engine, (d) the user interface, and (e) the user(s). This system was capable to report on the following functions: First, materials traceability which includes: sources, quantities, dates, names, prices, packages types and numbers, etc. Second was for machines and product lines report. Third, part was concerning about labor reports which includes: jobs, productivity, shift number, breakdown causes. Fourth, storing status, and the final part was for the quality report which includes: quantities, types, dates,. etc. Onion dehydration industry was taken as a case study to apply the computer-based system for helping in technical management for this factory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Server Virtualization Technology in Enterprise Information

    Publication Year: 2011 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    Server virtualization technology is the core of the dynamic resource scheduling, also is an effective solution of disaster recovery. Currently, the number of spreading servers in the data room is ever-increasing, data were heavily concentrated, the load on the server can not be understood, and can not b adjusted, it is difficult to make full use of server resources. This article from the perspective of server virtualization to discuss the dynamic allocation of server CPU, memory, hard drives and other resources based on application load. As virtualized servers can be activated, and can be restarted within a limited time to create an important server, virtualization server in a short time has quickly become one of the more cost-effective solutions of disaster recovery management capabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting an E-business Orientation

    Publication Year: 2011 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    E-business is transforming business around the world. The Web supplies an electronic market for commercial activity, linking buyers and suppliers worldwide. By the year 2003, the Internet had become the most important method for conducting business transactions. To take some global market share, many enterprises intend to adopt an e-business orientation. This article will analyze the impacts of adopting an e-business orientation and make recommendations for adopting an e-business dimension. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic Solutions of an Iterative Functional Differential Equation Near Resonance

    Publication Year: 2011 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    In this paper existence of local analytic solutions of an iterative functional differential equation is studied. As well as in previous works, we reduce this problem with the Schroder transformation to finding analytic solutions of a functional equation without iteration of the unknown function x . For technical reasons, in previous works the constant α given in the Schroder transformation is required to fulfil that α is off the unite circle s1 or lies on the circle with the Diophantine condition. In this paper, we obtain analytic solutions in the case of α at resonance, i.e., at a root of the unity and the case of near resonance under the Brjuno condition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Degree Dominance Set-valued Relation-based RSM in Intuitionistic Fuzzy Decision Tables

    Publication Year: 2011 , Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    By introducing a degree dominance relation to dominance set-valued intuitionistic fuzzy decision tables, we establish a degree dominance set-valued rough set model (RSM), which is mainly based on replacing the indiscernibility relation in classical rough set theory with the degree dominance set valued relation. To simplify knowledge representation and extract some nontrivial simpler degree dominance set-valued intuitionistic fuzzy decision rules, we propose two attribute reductions of the degree dominance set-valued intuitionistic fuzzy decision tables that eliminate the redundant condition attributes that are not essential from the viewpoint of degree dominance set-valued intuitionistic fuzzy decision rules. These results will be helpful for decision-making analysis in dominance set-valued intuitionistic fuzzy decision tables. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Small Bank Intermediary Business System for Social Insurance Based on Tuxedo

    Publication Year: 2011 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB) |  | HTML iconHTML  

    Commercial banks have paid more and more attention to the development of intermediary business, traditional intermediary business systems mostly adopt traditional client/server with two layers structure. This architecture suffers the following disadvantages: overload of client and server, poor scalability, difficulties in cross-platform and maintaining. The three-tier architecture based on the middleware tuxedo is introduced into intermediary business. The development methods based on middleware is described firstly. As an example of social insurance intermediary business, the business requirements and workflow are analyzed. Using data dependent routing and two-phase commit protocol, the system performance is optimized. The communication protocol and service dispatching method are proposed to achieve interaction with legacy systems. Finally, its efficiency has been proved by an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vibration Measurement and Excitation Analysis for the WZ12-1 Offshore Platform

    Publication Year: 2011 , Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    The paper presents the process of measuring the vibration signals of the WZ12-1 platform and analyzes the reason causing the serious vibrations of the WZ12-1 platform. First, the method for arranging the test points on the WZ12-1 platform is described. Then, the signals are collected under two different conditions. Finally, by examining the captured signals, we ascertain the cause leading to the excessive vibrations of the WZ12-1 platform. The paper provides a guide to measure and analyze the vibration signals of offshore platforms, which is highly significant for assuring the safety of offshore platforms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Image Segmentation Using RPCCL Clustering and Region Merging

    Publication Year: 2011 , Page(s): 49 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (598 KB) |  | HTML iconHTML  

    Image segmentation is very important to image analysis and satisfying methods are still unfounded. In this paper, we propose a new hybrid segmentation approach based on rival penalized controlled competitive learning (RPCCL) and region merging scheme. In the first, we performed median filtering on input image, and then selected initial color centers by using color quantization technique. During the RPCCL clustering, we merged some close centers to reduce classes. In the end, small regions were merged to produce the final segmentation results. Compared to original RPCCL, our method can overcome over-segmentation and obtain better results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fill in Occlusion Regions on Remotely Sensed Images Using Texture Synthesis Technique

    Publication Year: 2011 , Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1090 KB) |  | HTML iconHTML  

    Texture synthesis is a technique of generate new large image, from a small sample, that different from the original but has the same visual appearance. This technique is very valuable for filling missing information in images. In this paper, we apply Markov Random Fields (MRF) based texture synthesis technology to fill in occlusion areas on remotely sensed images. In order to improve the quality of results, we use GIS vector data to help to fill in the occlusion regions. Experiments show that the proposed method can obtain satisfying results and is practical in remote sensing application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid Technology and e-government

    Publication Year: 2011 , Page(s): 58 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Grid is the main technology in the e-government systems, based on characters of grid technology, we put forward to setup the e-government systems with different levels, this technology would be widely used in the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Conclusions about alpha-times Integrated C Semigroups

    Publication Year: 2011 , Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    This paper gets two main conclusions about α-times integrated C semi groups based on the Hille exponential formulas of the other kinds of semi groups, the generation theorem in terms of the Laplace transform and the properties of exponential bounded α-times integrated C semi groups. One is the representation theorem, the other is the Laplace inverse transform as well as two deductions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method of Laplacian Eigenmap-Based Pattern Recognition and Diagnosis for Incipient Fault of Pipelines

    Publication Year: 2011 , Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (508 KB) |  | HTML iconHTML  

    There is a considerable noise in the measured signal of pressure and flow of a running pipeline due to friction drag and medium diffusion, which poses an obstacle to the quick detection and precise classification of pipeline leakage, especially to the acquiring of weak incipient fault. This paper offers an incipient fault detection method based on nonlinear manifold learning algorithm, which treats the negative pressure wave signal as transient signal and reduces noise of original signal by using multi-scale wavelet transform. The method also learns original fault signal and extracts the intrinsic manifold features of data by using a nonlinear dimensionality reduction algorithm based on Laplacian Eigenmaps. With this method, the identification efficiency of optimal fault characteristics is noticeably improved, and the advantage of this method has been proved by simulation experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Analysis Environmental Resources Legislation in China

    Publication Year: 2011 , Page(s): 70 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (185 KB) |  | HTML iconHTML  

    It is important how to solve the environmental and resources laws and legislation of China. Through We analysis these laws and legislation problem about environment and resources in China, we think: Based on the situation, learn from advanced foreign experience and improve the legal system of China's environmental resource, Actively promote the scientific and democratic legislation, legislation to ensure the quality of environmental resources, Adhere to the "establishment, change, waste," both to ensure that existing laws and regulations of the coherence and effectiveness, Comprehensive integration of environmental management tools, establishment of government regulation, market guidance and public participation in the legal institutional framework, Research focus on legislation to improve the efficiency and effectiveness of legislative decision-making. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.