By Topic

Internet Computing & Information Services (ICICIS), 2011 International Conference on

Date 17-18 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 172
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (4956 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (382 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Message from the ICICIS 2011 Chair

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Mining Frequent Embedded Subtree from Tree-Like Databases

    Publication Year: 2011, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Mining frequent sub tree from databases of labeled trees is a new research field that has many practical applications in areas such as computer networks, Web mining, bioinformatics, XML document mining, etc. These applications share a requirement for the more expressive power of labeled trees to capture the complex relations among data entities. In this paper an efficient algorithm is introduced f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application on Integration Technology of Visualized Hierarchical Information

    Publication Year: 2011, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    As the grown of information inquiry and rapid development of information network, it has been seen that the traditional information technologies are no longer able to meet people's demands. The hyperbolic tree, on the other hand, is a newly introduced technology on hierarchical information visualization. We, after thoroughly investigated the principle of hyperbolic tree, transformed directory tree... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion States Recognition System Based on Ultrasound for Automatic Door Management

    Publication Year: 2011, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    The paper describes a novel motion states recognition system based on ultrasound to make up for the shortcomings of existing motion states recognition systems. Characteristics of this system are shown as follows: The motion states of people beside the door can be identified quickly and exactly by motion states recognition algorithm based on Doppler effect, an innovative divisional detection algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-based Reasoning Enabling Database Mining for Cryo-Preserving Algae Applications

    Publication Year: 2011, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Case-based Reasoning's (CBR) origins were stimulated by a desire to understand how people remember information and are in turn reminded of information, and that subsequently it was recognized that people commonly solve problems by remembering how they solved similar problems in the past. Thus CBR became an appropriate way to find out the most suitable solution method for a new problem based on the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision Support System for Technical Management of Food Processing Industries

    Publication Year: 2011, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    A computer-based decision support system called a Production Economical Reporting and Control System (PERCS) has been developed to help people work in food processing industries: decisions making, choosing between alternatives, solving problems and planning for the future. The system was divided into five parts: (a) the data management, (b) the model management system, (c) the knowledge engine, (d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Server Virtualization Technology in Enterprise Information

    Publication Year: 2011, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Server virtualization technology is the core of the dynamic resource scheduling, also is an effective solution of disaster recovery. Currently, the number of spreading servers in the data room is ever-increasing, data were heavily concentrated, the load on the server can not be understood, and can not b adjusted, it is difficult to make full use of server resources. This article from the perspecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting an E-business Orientation

    Publication Year: 2011, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    E-business is transforming business around the world. The Web supplies an electronic market for commercial activity, linking buyers and suppliers worldwide. By the year 2003, the Internet had become the most important method for conducting business transactions. To take some global market share, many enterprises intend to adopt an e-business orientation. This article will analyze the impacts of ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic Solutions of an Iterative Functional Differential Equation Near Resonance

    Publication Year: 2011, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    In this paper existence of local analytic solutions of an iterative functional differential equation is studied. As well as in previous works, we reduce this problem with the Schroder transformation to finding analytic solutions of a functional equation without iteration of the unknown function x . For technical reasons, in previous works the constant α given in the Schroder transformation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Degree Dominance Set-valued Relation-based RSM in Intuitionistic Fuzzy Decision Tables

    Publication Year: 2011, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    By introducing a degree dominance relation to dominance set-valued intuitionistic fuzzy decision tables, we establish a degree dominance set-valued rough set model (RSM), which is mainly based on replacing the indiscernibility relation in classical rough set theory with the degree dominance set valued relation. To simplify knowledge representation and extract some nontrivial simpler degree dominan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Small Bank Intermediary Business System for Social Insurance Based on Tuxedo

    Publication Year: 2011, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Commercial banks have paid more and more attention to the development of intermediary business, traditional intermediary business systems mostly adopt traditional client/server with two layers structure. This architecture suffers the following disadvantages: overload of client and server, poor scalability, difficulties in cross-platform and maintaining. The three-tier architecture based on the mid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vibration Measurement and Excitation Analysis for the WZ12-1 Offshore Platform

    Publication Year: 2011, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    The paper presents the process of measuring the vibration signals of the WZ12-1 platform and analyzes the reason causing the serious vibrations of the WZ12-1 platform. First, the method for arranging the test points on the WZ12-1 platform is described. Then, the signals are collected under two different conditions. Finally, by examining the captured signals, we ascertain the cause leading to the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Image Segmentation Using RPCCL Clustering and Region Merging

    Publication Year: 2011, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    Image segmentation is very important to image analysis and satisfying methods are still unfounded. In this paper, we propose a new hybrid segmentation approach based on rival penalized controlled competitive learning (RPCCL) and region merging scheme. In the first, we performed median filtering on input image, and then selected initial color centers by using color quantization technique. During th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fill in Occlusion Regions on Remotely Sensed Images Using Texture Synthesis Technique

    Publication Year: 2011, Page(s):54 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1090 KB) | HTML iconHTML

    Texture synthesis is a technique of generate new large image, from a small sample, that different from the original but has the same visual appearance. This technique is very valuable for filling missing information in images. In this paper, we apply Markov Random Fields (MRF) based texture synthesis technology to fill in occlusion areas on remotely sensed images. In order to improve the quality o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid Technology and e-government

    Publication Year: 2011, Page(s):58 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Grid is the main technology in the e-government systems, based on characters of grid technology, we put forward to setup the e-government systems with different levels, this technology would be widely used in the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Conclusions about alpha-times Integrated C Semigroups

    Publication Year: 2011, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper gets two main conclusions about α-times integrated C semi groups based on the Hille exponential formulas of the other kinds of semi groups, the generation theorem in terms of the Laplace transform and the properties of exponential bounded α-times integrated C semi groups. One is the representation theorem, the other is the Laplace inverse transform as well as two deduction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method of Laplacian Eigenmap-Based Pattern Recognition and Diagnosis for Incipient Fault of Pipelines

    Publication Year: 2011, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    There is a considerable noise in the measured signal of pressure and flow of a running pipeline due to friction drag and medium diffusion, which poses an obstacle to the quick detection and precise classification of pipeline leakage, especially to the acquiring of weak incipient fault. This paper offers an incipient fault detection method based on nonlinear manifold learning algorithm, which treat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Analysis Environmental Resources Legislation in China

    Publication Year: 2011, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    It is important how to solve the environmental and resources laws and legislation of China. Through We analysis these laws and legislation problem about environment and resources in China, we think: Based on the situation, learn from advanced foreign experience and improve the legal system of China's environmental resource, Actively promote the scientific and democratic legislation, legislation to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.