Proceedings of 2011 International Conference on Computer Science and Network Technology

24-26 Dec. 2011

Go

Filter Results

Displaying Results 1 - 25 of 169
  • [Title page]

    Publication Year: 2011, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • ICCSNT 2011 organization

    Publication Year: 2011, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Table of contents - Volume 4

    Publication Year: 2011, Page(s):vii - xv
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s):A-1 - A-12
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • The GPS height conversion method based on moving-surface fitting

    Publication Year: 2011, Page(s):2113 - 2116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    How to transfer GPS heights into normal heights has become a hotspot in survey engineering. There are many GIS fitting methods adopted in GPS heights conversion. A solution is sought the points where collocated by GPS (getting h) and geometry leveling (getting H) in certain area, and we could get the values of Quasi-geoid of these points. We call these points GPS/leveling points, namely the known ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved range query algorithm on over-DHT based P2P network

    Publication Year: 2011, Page(s):2117 - 2121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB) | HTML iconHTML

    P2P network is a focus research field with rapid development in recent years. Distributed hash tables (DHT for short) schemes are the core technique to locate and search resources in structured PlP network. However, due to the characteristic of DHT that its hash method destroy data locality, DHT only support exact-match search, cannot support complex search process. A simple and flexible solution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of cluster-based platform for Remote Sensing Information Computation

    Publication Year: 2011, Page(s):2122 - 2125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Remote Sensing Information Computation has features of large amount of image data and complex algorithms, many applications require real-time response, but mainstream computers are often unable to meet their performance requirements. Regarding to this problem, a cluster-based computing platform for remote sensing information computation was designed and implemented through interconnecting the exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation on performance of technology diffusion based on AHP in high-tech industry cluster

    Publication Year: 2011, Page(s):2126 - 2129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    High efficiency of technology diffusion in high-tech industry cluster contribute to the quick stable and coordinate development of corporations in high-tech industry cluster and give full play to the high-tech industry cluster functioning as growth pole as well as advancing the economical development of the whole region at large. This paper attempts to evaluate the performance of technology diffus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QR code image detection using run-length coding

    Publication Year: 2011, Page(s):2130 - 2134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (674 KB) | HTML iconHTML

    In order to improve the practical application property of the two-dimensional barcode Quick Response (QR) code, we investigate the coding and decoding process of the QR code image. Run-length coding is applied to binary QR code image so as to accelerate the identification of QR code image. The QR code is transformed into many runs of data in alternate pixels of black and white. The related runs of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and enforcement of separation-of-duty policies in role-base access control

    Publication Year: 2011, Page(s):2135 - 2140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Separation-of-duty (SoD) is widely considered to be a fundamental principle to role based access control (RBAC) models and systems should adhere. In this paper, we formulate and study the fundamental problem of SoD policies in the context of RBAC systems. We give a set-based specification of SoD policies and the safety checking problem for SoD policies in the context of RBAC. We study the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote sensing image fusion method based on generalized IHS transform

    Publication Year: 2011, Page(s):2141 - 2145
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    A fusion processing of remote sensing image data is carried out based on IHS principle, by using MATLAB experiment tool, in order to resolve the problem which can not give consideration to both the spatial resolution and spectral information in remote sensing. This paper proposes a fusion method by combining generalized intensity-hue-saturation (GIHS) transformation and maximum a posteriori (MAP) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image tag refinement using tag semantic and visual similarity

    Publication Year: 2011, Page(s):2146 - 2149
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Social tagging on online websites provides users interfaces of describing resources with their own tags, and vast user-provided image tags facilitate image retrieval and management. However, these tags are often not related to the actual image content, affecting the performance of tag related applications. In this paper, a novel approach to automatically refine the image tags is proposed. Firstly,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The model of extracting the height of buildings by shadow in image

    Publication Year: 2011, Page(s):2150 - 2153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    Recently there are many models which make the usage of buildings' shadows to calculate its height, however, they don't care for the universal demand and the method of using coordinates of spatial points is rare. Therefore a comprehensive analysis puts forward, referring how to utilize a single high resolution satellite image to extract construction's height, and models which involve spatial coordi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Population diversity analysis of The Adaptive Partly Informed PSO algorithm

    Publication Year: 2011, Page(s):2154 - 2158
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    Particle Swarm Optimization (PSO) is one of the newly developed intelligence optimization algorithms. With its simple concept, few parameters and scalable performance, PSO has become a very promising optimization tool and attracted extensive attention. In this paper, probabilistic analysis on swarm diversity in Adaptive Partly Informed Particle Swarm Optimization algorithm (API-PSO) was conducted.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MEMS based Human-Machine Interaction System for virtual touring

    Publication Year: 2011, Page(s):2159 - 2163
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    To obtain a kind of cheap, convenient and user-friendly virtual reality interaction system, the Human-Machine Interaction System based on Micro Electronic Mechanical Sensor (MEMS), LM3S1138 embedded Micro Control Unit (MCU) and Vega modeling software for virtual touring is introduced in this paper. Two MEMS including a magnetic sensor and an accelerate sensor are utilized to calculate the state va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rate adaptive scheme for improving concurrent MAC protocol performance in multi-hop ad hoc networks

    Publication Year: 2011, Page(s):2164 - 2168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    In this paper, we focus on improving concurrent MAC (CMAC) protocol performance in multi-hop ad hoc networks. Based on the analysis of the collision problems and multi-rate problems of the distributed coordination function (DCF) and CMAC protocol in multi-hop ad hoc networks, we propose a rate adaptive scheme for improving CMAC protocol performance. The scheme allows nodes to adaptively select app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key characteristics extraction method in product concept design

    Publication Year: 2011, Page(s):2169 - 2173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB) | HTML iconHTML

    To improve the product design quality, a key characteristics (KCs) extraction method in the product concept design was proposed. Firstly, a KCs extraction process in product concept design was established. In order to transform customer requirements into product characteristics, a Human-Product transform method was proposed. Secondly a KCs extraction algorithm was presented. Customer requirements ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensor networks localization with improvement in energy consumption

    Publication Year: 2011, Page(s):2174 - 2177
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    Using enormous number of sensor nodes has enabled WSNs to take a large area under their control. In these networks nodes are randomly distributed and have no specific information about their geographical position. But many applications and protocols require being aware of nodes localization in WSNs. Many localization algorithms have proposed radio frequency to calculate node's position. This paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on appraisal system of transport network planning project in corridor

    Publication Year: 2011, Page(s):2178 - 2182
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Revising the basic concept of transport corridor, it wound introduce its theory evidence for the network planning project. By analyzing the key issues affecting the shape and framework of transport corridor, five qualitative indices was put forward with each one's detail reference. Then seven groups of indices were found out with each formula by analyzing which one rational transport system should... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for web documents clustering based on dynamic concept

    Publication Year: 2011, Page(s):2183 - 2187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Conceptual clustering can be used to solve the lack of domain knowledge or incompleteness. According to the organizational structure and characteristics of web documents subject information, and based on the conceptual clustering techniques, the paper proposes and implements the dynamic concept clustering algorithm and merge algorithm for web documents clustering, and proves the superiority of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Misiurewiz points in Mandelbrot set

    Publication Year: 2011, Page(s):2188 - 2191
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1516 KB) | HTML iconHTML

    Misiurewiz points and attracting points of the chaotic regions in the Mandelbrot set are located in what we call shrubs. Certain branch points are Misiurewicz points (including all "obvious" branch points in the filaments) and certain terminal points are also Misiurewicz points. Using the method of computer mathematic experiments , The distribution rules of Misiurewiz points in Mandelbrot set gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application on fuzzy PID technology for central heating

    Publication Year: 2011, Page(s):2192 - 2195
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1138 KB) | HTML iconHTML

    Central heating system is a big lag, time-varying, nonlinear complex system, the parameter self-tuning fuzzy PID control can use the fuzzy control rules to modify the pm parameters online, and therefore has good adaptive ability. This paper analyzes the central heating system in the model, and designed a fuzzy parameter self-tuning pm controller. pm control and fuzzy PID control simulation of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of flight control system software for unmanned helicopter

    Publication Year: 2011, Page(s):2196 - 2200
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1253 KB) | HTML iconHTML

    In this paper, we address the design of software that achieves stable, reliable feather for an unmanned helicopter's flight control system. According to the logical view and data view are given to the flight control system, the method of software architecture is researched. At last, the results of this work are illustrated by experiment, showing that the software base on this architecture has well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of detecting e-business fraud based on data mining

    Publication Year: 2011, Page(s):2201 - 2204
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    The advent of electronic business (e-business) has made a large change in the way of business. Electronic business growth has increased very much in a great deal of practices. Researchers have posed rules-based auditing systems for electronic business transactions, but they rely on the auditor's knowledge of e-business fraud highly. While fraud happen, it is difficult to deal with by business syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture design of monitoring and controlling system of central heating

    Publication Year: 2011, Page(s):2205 - 2208
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    With the development of the computer technology, the monitoring and controlling system is getting more and more important in central heating. Taking the central heating of Caofeidian for example, this paper introduces the structure, feature and function of monitoring and controlling system in central heating. The network constitute of remote monitoring controlling system of the central heating des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.