By Topic

2012 Fifth International Conference on Information and Computing Science

24-25 July 2012

Filter Results

Displaying Results 1 - 25 of 69
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (626 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (626 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • On from What Follows What and Command Control in a Tennis Point Played

    Publication Year: 2012, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    We propose new and original models to trace the game and assess the quality of an execution. The models are intended to serve as a logical adapter between mostly unique tennis techniques and pragmatic approach to achieve the best performance outcome. The potential of Hawkeye TM technology can be discovered through the models and utilised in a tennis player development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Real-Time, Interactive Simulation Environment for Unmanned Ground Vehicles: The Autonomous Navigation Virtual Environment Laboratory (ANVEL)

    Publication Year: 2012, Page(s):7 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Modeling and simulation tools have become an integral part of modern engineering processes. In particular, accurate and efficient simulation tools are critical for the design, development, and testing of autonomous unmanned ground vehicles (UGVs). However, because of the complexity of the problem, many UGV simulators are computationally intensive, require expensive hardware to run, and are often n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Expert System for a Golfer: Are You Keen or Desperate?

    Publication Year: 2012, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    A software tool has been developed which is able to estimate the cost of a change in a given golf context. The idea is to advise golf objective setting process. The simple expert system is based on the concepts of Bayesian likelihood and Markov Chain. We present the original functionality of the solution and challenges of the approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving VRP Using Ant Colony Optimization Algorithm

    Publication Year: 2012, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Provides a novel hybrid ant colony algorithm combining genetic algorithm with implicit parallel function to make up the shortcomings of common ant colony alogrithm in the vehicle routing problem including slow convergence in the early stages. Introducing the encoding and mutation operation can improve the efficiency of solving the optimal distribution path. The comparative analysis of vehicle rout... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Paradigm Integration of Computational Intelligence Performance in Cloud Computing towards Data Security

    Publication Year: 2012, Page(s):19 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Cloud is an intelligence computational web based model, which aims to ease a service provisioned helping service providers by delivering the illusion of infinite underlying resources and automatic scalability. Computational intelligence (CI) is a mathematical modeling technique of cloud computing, which are vitally importance to simplifying the complex systems and designing proactive and adaptive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of the Approximate Algorithm Based on Cubic B-spline Curves

    Publication Year: 2012, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    B-Spline curves are very flexible; it overcomes lots of shortcomings of Bezier curves. It is of great value in practical applications. This thesis is based on the approximate algorithm offered by literature [1]. In this paper, we promote the algorithm in literature [1] to the cubic B-Spline curve approximate fields which is based on the double quadratic B-Spline curves. With this paper's algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Root-Finding Algorithm of Three-Point Quadratic Interpolation of the Nonlinear Equation

    Publication Year: 2012, Page(s):27 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    An iterative algorithm is provided with a superlinear convergence, without a calculation of the derivative. By means of the three-point quadratic interpolation in optimization technology, the solution to nonlinear equation f(x) = 0 can be turned into that of the extreme evaluation of function g(x) = [f(x)]2. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A BP Training Fitting Method about Multivariate BRDF Based on B-spline Function

    Publication Year: 2012, Page(s):30 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    For a large number of experimental data, the BRDF surface fitting method based on B-spline function and least squares theory, the ill-conditioned normal equations, the low accuracy of the results and long CPU time may be appeared. Thereby, in this paper by using the BP learning method, combined with the training process of L-M algorithm, an improved method is presented. And the method is applied t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of the Smoothed Monthly Mean Sunspot Area Using Artificial Neural Metwork

    Publication Year: 2012, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Sunspot area is an important feature to measure the solar activities. Prediction of sunspot area can provide useful information for solar activities and space weather studies etc. In this paper, we propose a smoothed monthly mean sunspot area prediction method using artificial neural network. The prediction model is built by training the area data before the eighteenth solar cycle, and then foreca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Vegetable Seed Electrophoresis Image Classification Method

    Publication Year: 2012, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    To verify the performance of crop classification and variety clustering based on electrophoretogram and investigate vegetable seed genetic relationships, three kinds of breeder's seeds samples are collected. They are bell pepper, Chinese cabbage and cucumber. 30 varieties of each kind of crop have been collected. And standard electrophoretograms of them are prepared by method of protein ultra thin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Pedigree Clustering of Peanut Pod's Variety Based on Image Processing

    Publication Year: 2012, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Using image recognition, 20 varieties of peanut are collected through scanner. The image of 100 peanut seeds' positive and two sides of each variety are collected; each image's characteristics of shape, color and texture totaling up to 50 are obtained. A cluster analysis model based on these features and another cluster analysis model with PCA data optimizing is built. For further step, we have go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of a Class of Boolean Optimized Model and Its Algorithm

    Publication Year: 2012, Page(s):45 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In the course of textbook management, we should make the leavings of textbook in the warehouse to remain as minimum as possible in order to reduce the unnecessary loss. In this paper, Boolean optimization model of this problem is established, and the machinery algorithm is given. Thereby the optimum strategy of handing out textbook is realized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis and Numerical Simulation of Shaft Principal Stress Based on Excel

    Publication Year: 2012, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    This paper employed Excel to calculated the stress of the shaft with complicated force, applied numerical simulation to the axial principal stress distribution, therefore the analysis of dangerous cross-section and the tedious task of calculation becamed easier, faster, accurate and more graphical, the quality and effectiveness of the design be upgraded and proposed a practical approach for the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Accessibility to Urban Public Sports Facilities: A GIS Approach Based on Network Analysis Model

    Publication Year: 2012, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (597 KB) | HTML iconHTML

    Urban public sports facilities are an important part of the urban land, as well as a subsystem of the urban system. Evaluation of urban public sports facilities is one of the important issues in the study of urban systems. Urban public sports facilities are studied with the support of GIS technology. In the Study, based on GIS network analysis method, and according to the city public sports facili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessibility Analysis of Urban Parks Based on GIS

    Publication Year: 2012, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    Accessibility of urban parks is an important indicator in urban green space system. Urban construction is increasingly focusing on system services of green space. Based on ArcGIS, this article calculates the accessibility of the study area using the buffer analysis and cost-weighted distance methods, analyzes the service area and its population, and concludes that the result of buffer analysis met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of the Spread of Epidemics with Individuals Contact Using Cellular Automata Modeling

    Publication Year: 2012, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Based on the theory of complexity adaptive system, a cellular automata model to simulate the complex process of epidemic spread was built. The population was divided into three classes: infected, immunized and susceptible. Specifically, the epidemic was considered as one with the characteristic of vertical transmission. Furthermore, the model could be extended to conclude the effects of population... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implement of a Security iSCSI Based on SSL

    Publication Year: 2012, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    The existing scheme of disaster-tolerant cann't satisfy the requirements for confidential datum. The systemic framework of distributed secure storage is put forward. The structure of metedata servers, storage servers and the mechanism of data renewal are designed. According to the requirement for security of the storage system, the secure coding scheme of information dispersal algorithm based on c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.