By Topic

Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on

Date 17-19 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 368
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (3000 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (3000 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xxv
    Request permission for commercial reuse | PDF file iconPDF (342 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee lists

    Publication Year: 2012, Page(s):xxvii - xxviii
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Research of Integration Mode between Simulation and C4ISR System

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The interoperability between simulation environment and C4ISR (Command, Control, Communication, Computer, Intelligence, Surveillance, Reconnaissance) system is a key technology in the domain of military system simulation. This context starts from analyzing the demand of integration between simulation environment and C4ISR system, and researches the interactive models between them. Meantime, this c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation of Mounting Machine Based on VRML

    Publication Year: 2012, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Mounting machine is the most critical bottleneck equipment in the SMT, the production efficiency of which restricts the entire assembly line's productivity dramatically. In order to enhance the virtual manufacture of paste simulation for PCB circuit modular, it is essential and critical for virtual reality simulation to build 3D model for the mounting machine in an efficient and accurate way. Base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Synthetic Color Correction Method of Multi-projectors Display System

    Publication Year: 2012, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    In the multi-projectors display system, color correction is still a primary problem without a perfect solution. The difficulty of color correction mainly comes from three points: intensity transform function (ITF) calibration, intensity balancing and edge blending. In this paper, a synthetic color correction method composed of new algorithms against the three points is proposed. For ITF calibratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Three-Dimensional Visual Simulation Technology and Its Application in Surface Coal Mine

    Publication Year: 2012, Page(s):14 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    Three-dimensional geological solid model of surface coal mine is constructed on the platform of AutoCAD. The determination of initial mining area, forming ditch and direction of working bench were optimized on the basis of geological model and mining model. In addition mining-stripping procedure is simulated. The specific method of three-dimensional visual simulation technology in surface coal min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Computation of Wellbore Dynamic Pressure during Perforating

    Publication Year: 2012, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    The wellbore dynamic pressure waves are produced in the perforation liquid after the shaped charges are initiated and then fiercely strike the gunstring, packer, casing and artificial bottom. The impact and damage effect only depend on the amplitude and holding time of dynamic pressures. This paper discusses the simplification of perforators' explosion with gun in the oil well. On the basis of sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of 3D Geological Structure Modeling and Visualization Application Based on Computer Technology

    Publication Year: 2012, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    The paper takes Yinchuan plain as a research object, and basically investigated the quaternary geology and the spatial distribution and structure characteristics of groundwater system. The method of virtualizing boreholes is used to increase borehole data in accordance with the well-developed geological structures, the complex strata and lithology, the multiple geomorphologic units, the large area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform

    Publication Year: 2012, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objectives Optimization on Exhaust Muffler Based on DoE

    Publication Year: 2012, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    For one exhaust muffler, this paper researches its performance of flow and noise. Muffler' comprehensive evaluation system and DoE development flow are built. RBF mathematical models of evaluated objectives are established to look for Pareto optimal solutions. According to design request, this paper chooses and evaluates optimized projects from Pareto solutions. The result shows that in low and mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anisotropic Mechanical-Hydraulic Coupling for Deep Buried Tunnel in Soft Rock with Rich Water

    Publication Year: 2012, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Qilianshan tunnel is a key project on Lanzhou-Xinjiang passenger dedicated line, located in Gansu province in the Northwest China. It is subjected to geo-stress in soft rock with rich water. Anisotropic mechanical-hydraulic coupling model was performed to investigate the energy density, effective stress and maximum shear stress, displacements and plastic zone of surrounding rock. Consequently, res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forward Error Correction

    Publication Year: 2012, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    In modern telecommunication systems, FEC has been widely used. The emergence and development of this technology is the need of the telecommunication system itself. In the engineering practice, the ideal digital channel does not exist, which results from distortion and non-isochronous delay. Such result means generating error and jitter, which finally can be reflected in the error code of the syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Adaptive Transmission of H.264 Video Stream and QoS Guarantee Based on SIP

    Publication Year: 2012, Page(s):41 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Taking into account the fact that uneven video streams, instability of the network bandwidth, it's difficult to match the transmission bandwidth and video bit rate in video delivery procedure. Based on the SIP / SDP protocol, this paper presents an adaptive video streaming transmission control algorithm, customs a RTP / RTCP control strategy. Considering the current network status, receiver-side b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Ontology Instance Learning Based on Maximum Entropy Model

    Publication Year: 2012, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Ontology Instance learning is a significant part in the research of ontology evolution and is important for the applications of ontology. One of the key points of ontology instance learning is automatic instances learning from large amounts of unstructured data. In this paper, an effective method of ontology instance learning is proposed, while the experience of the methods of information extracti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cause Analysis and Safety Measures for Borehole Sloughing Type of Collapsing

    Publication Year: 2012, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    The borehole sloughing type of collapsing is very common in the drilling process. And this condition may result in drill string sticking and enlarged hole and induce other underground complex conditions, which may affect the successful drilling and underground safety. This thesis analyzes the elements resulting in borehole sloughing, components and properties of the drilling fluid system, and dril... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation System Design of Tactical Ballistic Missile Interception Based on UML

    Publication Year: 2012, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper, ideas of TBM interception modeling and simulation system design based on Unified Modeling Language (UML) are proposed. Firstly, this paper introduces the basic framework for UML modeling. Secondly, static structure model and dynamic interactive model of TBM interception system are established. Specifically, the description of system requirements is given by Use Case Diagram, then we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Potential-Based Finite Element Algorithm for Eddy-Current Problems

    Publication Year: 2012, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    In this paper we investigate the potential-based finite element algorithms for eddy-current problems. In our models the source coil carries a pulse excitation current generating a transient field. As distinguished from the traditional coupled algorithm whose discrete equation system including both vector and scalar potential unknowns is solved at every time-step, a novel decoupled algorithm is pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects Analysis Based on Computer Simulation of Autonomous Underwater Vehicle Throw Limiting Period on the Initial Trajectory

    Publication Year: 2012, Page(s):62 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    We have set up an AUV (autonomous underwater vehicle) space trajectory mathematical model. Then, the fourth-order Runge-Kutta method and full pivoting Gaussian elimination method are used for the computer simulation of different control distance for the different balancing weighting properties. The initial ballistic changes in the law are researched. The simulation results are as follows. In condi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Battle Damage Level Prediction Using Hybrid-learning Algorithm

    Publication Year: 2012, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    It is important to predict battle damage level timely and accurately for operation commander to adjust firing action intent, issue command, control situations, and make decisions correctly. Adaptive neural fuzzy inference system (ANFIS) architecture and the hybrid-learning algorithm by applying back-propagation and least mean squares procedure are studied. ANFIS model for battle damage level predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.